Login / Signup
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.
Ivan Damgård
Tomasz Kazana
Maciej Obremski
Varun Raj
Luisa Siniscalchi
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
cca secure
encryption scheme
public key encryption scheme
standard model
public key cryptosystem
public key
ciphertext
proxy re encryption
forward secure
security analysis
secret key
identity based encryption
database systems
diffie hellman
similarity measure