Login / Signup
Hedged Public-key Encryption: How to Protect against Bad Randomness.
Mihir Bellare
Zvika Brakerski
Moni Naor
Thomas Ristenpart
Gil Segev
Hovav Shacham
Scott Yilek
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
public key encryption
proxy re encryption
public key
standard model
keyword search
encryption scheme
identity based encryption
information systems
databases
search engine
similarity measure
distributed systems
digital signature