Login / Signup
Public key encryption with public-verifiable decryption delegation and its application.
Xin Hou
Xiaofeng Jia
Jun Shao
Published in:
J. Inf. Secur. Appl. (2023)
Keyphrases
</>
public key encryption
encryption scheme
ciphertext
proxy re encryption
secret sharing
standard model
secret sharing scheme
public key
cca secure
identity based encryption
security policies
information retrieval
access control
data sharing
conflict resolution
private key