Login / Signup
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity.
Ryotaro Hayashi
Keisuke Tanaka
Published in:
ACISP (2006)
Keyphrases
</>
high security
security properties
database
information hiding
personal information
encryption scheme
image encryption
secure communication
encryption decryption