Login / Signup
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Yang Wang
Mark Manulis
Man Ho Au
Willy Susilo
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
key management
private key
security properties
public key
sensitive data
trusted third party
ciphertext
privacy preserving
personal information
encryption scheme
data mining
social networks
statistical databases
secret key
secure communication