Login / Signup

Dynamic and efficient joint encryption scheme in the plain public key model.

Zuhua Shao
Published in: Comput. Electr. Eng. (2009)
Keyphrases
  • public key
  • security model
  • encryption scheme
  • security analysis
  • private key
  • databases
  • similarity measure
  • proxy re encryption