Login / Signup
Proxy Re-Encryption Schemes with Key Privacy from LWE.
Le Trieu Phong
Lihua Wang
Yoshinori Aono
Manh Ha Nguyen
Xavier Boyen
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
encryption key
encryption scheme
proxy re encryption
homomorphic encryption
privacy enhancing
privacy preserving
standard model
data sharing
keyword search
security model
personal information
public key
ciphertext
public key encryption
private key
low cost
relational databases