Sign in
Anonymous Public Key Encryption under Corruptions.
Zhengan Huang
Junzuo Lai
Shuai Han
Lin Lyu
Jian Weng
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
public key encryption
proxy re encryption
public key
standard model
peer to peer
encryption scheme
identity based encryption
keyword search
ciphertext