Login / Signup

Token-Controlled Public Key Encryption.

Joonsang BaekReihaneh Safavi-NainiWilly Susilo
Published in: ISPEC (2005)
Keyphrases
  • public key encryption
  • proxy re encryption
  • information retrieval
  • public key
  • databases
  • information extraction
  • encryption scheme
  • standard model