Login / Signup
A Closer Look at Anonymity and Robustness in Encryption Schemes.
Payman Mohassel
Published in:
ASIACRYPT (2010)
Keyphrases
</>
encryption scheme
standard model
public key
ciphertext
security model
diffie hellman
cca secure
public key encryption
relational databases
data sharing
secret key
security analysis
signcryption scheme
proxy re encryption
chosen ciphertext