Login / Signup

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.

Chunpeng GeWilly SusiloJiandong WangZhiqiu HuangLiming FangYongjun Ren
Published in: Comput. J. (2016)
Keyphrases
  • proxy re encryption
  • ciphertext
  • standard model
  • private key
  • cca secure
  • public key
  • signature scheme
  • encryption scheme
  • databases
  • secret key
  • information retrieval
  • query processing
  • public key encryption