Login / Signup
Dynamic and efficient joint encryption scheme in the plain public key model.
Zuhua Shao
Published in:
Comput. Electr. Eng. (2009)
Keyphrases
</>
public key
security model
encryption scheme
security analysis
private key
databases
similarity measure
proxy re encryption