Login / Signup
Encryption Schemes with Post-Challenge Auxiliary Inputs.
Tsz Hon Yuen
Ye Zhang
Siu-Ming Yiu
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
encryption scheme
standard model
public key
ciphertext
public key encryption
hash functions
proxy re encryption
data sharing
secret key
security analysis
lossless compression
security model
image sequences
input data
low cost
knn
high quality