Login / Signup

Towards Tightly Secure Deterministic Public Key Encryption.

Daode ZhangBao LiYamin LiuHaiyang XueXianhui LuDingding Jia
Published in: ICICS (2017)
Keyphrases
  • public key encryption
  • proxy re encryption
  • public key
  • encryption scheme
  • standard model
  • ciphertext
  • high dimensional
  • intrusion detection
  • identity based encryption