Login / Signup
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles.
Jae Woo Seo
Dae Hyun Yum
Pil Joong Lee
Published in:
Theor. Comput. Sci. (2013)
Keyphrases
</>
proxy re encryption
cca secure
standard model
ciphertext
keyword search
security model
encryption scheme
public key
identity based encryption
signature scheme
keywords
access control
secret key
relational databases
security analysis
database
structured data
provably secure
database systems
search engine