Login / Signup
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
Zvika Brakerski
Gil Segev
Published in:
J. Cryptol. (2014)
Keyphrases
</>
public key encryption
public key
encryption scheme
identity based encryption
proxy re encryption
information security
security issues
security requirements
standard model
security model
databases
access control
security analysis
database
intrusion detection
network security