Login / Signup
Multi-recipient Public-Key Encryption from Simulators in Security Proofs.
Harunaga Hiwatari
Keisuke Tanaka
Tomoyuki Asano
Koichi Sakumoto
Published in:
ACISP (2009)
Keyphrases
</>
public key encryption
proxy re encryption
encryption scheme
public key
standard model
identity based encryption
security issues
email
security model
information security
metadata
relational databases