Escrowed decryption protocols for lawful interception of encrypted data.
David NuñezIsaac AgudoJavier LópezPublished in: IET Inf. Secur. (2019)
Keyphrases
- encrypted data
- encryption scheme
- homomorphic encryption
- encryption algorithm
- third party
- sensitive data
- sql queries
- data storage
- ciphertext
- data hiding
- read write
- standard model
- service providers
- security analysis
- public key
- rfid tags
- data privacy
- privacy preserving
- secret key
- relational databases
- data mining
- databases
- cloud computing
- digital libraries
- low cost
- lossless compression
- digital content
- data sharing