Login / Signup

Multi-recipient Public-Key Encryption from Simulators in Security Proofs.

Harunaga HiwatariKeisuke TanakaTomoyuki AsanoKoichi Sakumoto
Published in: ACISP (2009)
Keyphrases
  • public key encryption
  • proxy re encryption
  • encryption scheme
  • public key
  • standard model
  • identity based encryption
  • security issues
  • email
  • security model
  • information security
  • metadata
  • relational databases