Sign in

Anonymous Public Key Encryption Under Corruptions.

Zhengan HuangJunzuo LaiShuai HanLin LyuJian Weng
Published in: ASIACRYPT (3) (2022)
Keyphrases
  • public key encryption
  • proxy re encryption
  • public key
  • standard model
  • peer to peer
  • encryption scheme
  • keyword search
  • low cost
  • query processing
  • security model
  • ciphertext
  • identity based encryption