View Document Preview and Link
Document Date: 2006-12-15 20:05:23 Open Document File Size: 217,25 KB Share Result on Facebook
City Hierarchical Identity / Elgamal / / Company G1 / idC / GT / / Currency USD / / / Event FDA Phase / / Facility building CCA-secure Identity-Based Encryption / Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute Johns Hopkins University / / IndustryTerm private-key generation algorithm / decryption algorithm / re-encryption algorithm / proxy re-encryption protocols / cryptographic protocols / costly online request / probabilistic polynomial time algorithms / law enforcement / / Organization Johns Hopkins University / / Person Matthew Green Giuseppe Ateniese / Bob / Key Generator / Alice / / Position IND-Pr-ID-CPA / AdvIND-Pr-ID-CPA / CPA / Private / / Product Halevi / Canetti / Franklin / Katz / IBP1 / / ProvinceOrState Rhode Island / / Technology private-key generation algorithm / proxy re-encryption protocols / Decrypt algorithm / bidirectional re-encryption / probabilistic polynomial time algorithms / quorum-based protocol / extended Identity Based Encryption / proxy re-encryption / identity-based encryption / secret key / re-encryption algorithm / extracted re-encryption / specified F-O decryption algorithm / Non-interactive Identity-Based Proxy Re-encryption / 3.1 Identity-Based Proxy Re-Encryption An Identity-Based Proxy Re-encryption / Encryption / Reencrypt algorithm / KeyGen algorithm / unidirectional proxy encryption / public key / CCA2-secure public-key encryption / public-key encryption / IBE encryption / public-key searchable encryption / second algorithm / Encrypt algorithm / using double-encryption / Identity-Based proxy re-encryption / / SocialTag