Login / Signup
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Chunpeng Ge
Willy Susilo
Jiandong Wang
Zhiqiu Huang
Liming Fang
Yongjun Ren
Published in:
Comput. J. (2016)
Keyphrases
</>
proxy re encryption
ciphertext
standard model
private key
cca secure
public key
signature scheme
encryption scheme
databases
secret key
information retrieval
query processing
public key encryption