Towards a Separation of Semantic and CCA Security for Public Key Encryption.
Yael GertnerTal MalkinSteven A. MyersPublished in: TCC (2007)
Keyphrases
- public key encryption
- public key
- proxy re encryption
- encryption scheme
- information security
- identity based encryption
- natural language
- query processing
- security model
- standard model
- canonical correlation analysis
- information systems
- intrusion detection
- security mechanisms
- security issues
- network security
- access control
- security policies
- diffie hellman
- database systems