Login / Signup
Strong Post-Compromise Secure Proxy Re-Encryption.
Alex Davidson
Amit Deo
Ela Lee
Keith Martin
Published in:
ACISP (2019)
Keyphrases
</>
public key encryption
proxy re encryption
standard model
security model
cca secure
ciphertext
keyword search
encryption scheme
public key
security requirements
diffie hellman
access control
identity based encryption
relational databases
private key
security analysis
information systems
security policies
metadata