What about Bob? The Inadequacy of CPA Security for Proxy Reencryption.
Aloni CohenPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- ring signature scheme
- intrusion detection
- network security
- access control
- information security
- security issues
- computer security
- security problems
- functional requirements
- key management
- security systems
- security policies
- security mechanisms
- cyber security
- information systems
- trusted third party
- security threats
- security properties
- security level
- authentication protocol
- security protocols
- security requirements
- statistical databases