Login / Signup
Securely Obfuscating Re-encryption.
Susan Hohenberger
Guy N. Rothblum
Abhi Shelat
Vinod Vaikuntanathan
Published in:
TCC (2007)
Keyphrases
</>
encryption algorithms
secret key
encryption scheme
image encryption
multimedia streaming
key management
encryption algorithm
key exchange
encryption decryption
data encryption standard
database
databases
neural network
information hiding
data protection