Continuous Leakage-Amplified Public-Key Encryption With CCA Security.
Wenzheng ZhangZirui QiaoBo YangYanwei ZhouMingwu ZhangPublished in: Comput. J. (2022)
Keyphrases
- public key encryption
- public key
- proxy re encryption
- encryption scheme
- canonical correlation analysis
- standard model
- access control
- information security
- keyword search
- database systems
- security model
- information leakage
- identity based encryption
- information systems
- security issues
- network security
- ciphertext
- low cost
- data model