On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Jian WengYunlei ZhaoGoichiro HanaokaPublished in: Public Key Cryptography (2011)
Keyphrases
- public key cryptography
- security policies
- intrusion detection
- access control
- security requirements
- information security
- network security
- security mechanisms
- computer security
- security problems
- public key
- case study
- biometric systems
- statistical databases
- e government
- security analysis
- data security
- security systems
- user authentication
- security level
- security properties
- control system
- search algorithm