Login / Signup
Escrowed decryption protocols for lawful interception of encrypted data.
David Nuñez
Isaac Agudo
Javier López
Published in:
IET Inf. Secur. (2019)
Keyphrases
</>
encrypted data
encryption scheme
homomorphic encryption
encryption algorithm
third party
sensitive data
sql queries
data storage
ciphertext
data hiding
read write
standard model
service providers
security analysis
public key
rfid tags
data privacy
privacy preserving
secret key
relational databases
data mining
databases
cloud computing
digital libraries
low cost
lossless compression
digital content
data sharing