Sign in

Proxy visible re-encryption scheme with application to e-mail forwarding.

Gaurav PareekB. R. Purushothama
Published in: SIN (2017)
Keyphrases
  • email
  • encryption scheme
  • standard model
  • databases
  • proxy re encryption
  • digital libraries
  • knn
  • similarity search
  • security analysis
  • diffie hellman