Login / Signup
Simulation-Based Bi-Selective Opening Security for Public Key Encryption.
Junzuo Lai
Rupeng Yang
Zhengan Huang
Jian Weng
Published in:
ASIACRYPT (2) (2021)
Keyphrases
</>
public key encryption
public key
proxy re encryption
business intelligence
encryption scheme
information security
database
standard model
security model
keywords
access control
intrusion detection
security issues
security requirements
security mechanisms