Login / Signup
Identity-Based Conditional Proxy Re-Encryption.
Jun Shao
Guiyi Wei
Yun Ling
Mande Xie
Published in:
ICC (2011)
Keyphrases
</>
proxy re encryption
standard model
identity based encryption
ciphertext
keyword search
security model
encryption scheme
public key encryption
public key
signature scheme
cca secure
signcryption scheme
relational databases
secret key
information systems
structured data
access control