Login / Signup

PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity.

Ryotaro HayashiKeisuke Tanaka
Published in: ACISP (2006)
Keyphrases
  • high security
  • security properties
  • database
  • information hiding
  • personal information
  • encryption scheme
  • image encryption
  • secure communication
  • encryption decryption