Login / Signup
Memory-Tight Multi-Challenge Security of Public-Key Encryption.
Joseph Jaeger
Akshaya Kumar
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
public key encryption
public key
proxy re encryption
encryption scheme
standard model
public key cryptosystem
security model
identity based encryption
access control
intrusion detection
security policies
security issues
relational databases
information security
search engine
key management