Login / Signup

Hedged Public-Key Encryption: How to Protect against Bad Randomness.

Mihir BellareZvika BrakerskiMoni NaorThomas RistenpartGil SegevHovav ShachamScott Yilek
Published in: ASIACRYPT (2009)
Keyphrases
  • public key encryption
  • public key
  • proxy re encryption
  • encryption scheme
  • standard model
  • identity based encryption
  • database
  • low cost