Login / Signup
Relations between robustness and RKA security under public-key encryption.
Hui Cui
Yi Mu
Man Ho Au
Published in:
Theor. Comput. Sci. (2016)
Keyphrases
</>
public key encryption
proxy re encryption
encryption scheme
public key
standard model
identity based encryption
security model
ciphertext
information security
databases
quadtree
keyword search
security policies
security requirements
cost effective
security analysis
intrusion detection
access control