Login / Signup
Anonymous Public Key Encryption Under Corruptions.
Zhengan Huang
Junzuo Lai
Shuai Han
Lin Lyu
Jian Weng
Published in:
ASIACRYPT (3) (2022)
Keyphrases
</>
public key encryption
proxy re encryption
public key
standard model
peer to peer
encryption scheme
keyword search
low cost
query processing
security model
ciphertext
identity based encryption