Adaptively Secure Proxy Re-encryption.
Georg FuchsbauerChethan KamathKaren KleinKrzysztof PietrzakPublished in: Public Key Cryptography (2) (2019)
Keyphrases
- public key encryption
- proxy re encryption
- standard model
- security model
- cca secure
- keyword search
- ciphertext
- public key
- encryption scheme
- identity based encryption
- diffie hellman
- private key
- security analysis
- provably secure
- databases
- access control
- security requirements
- signature scheme
- information security
- xml data
- anomaly detection
- distributed systems
- data model