Login / Signup
Proxy Re-Encryption and Re-Signatures from Lattices.
Xiong Fan
Feng-Hao Liu
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
proxy re encryption
standard model
signature scheme
security model
keyword search
public key
public key encryption
ciphertext
digital signature
signature verification
cca secure
database
encryption scheme
security requirements
access control
wireless sensor networks
data model
machine learning