Login / Signup
On Compressing Encrypted Data without the Encryption Key.
Mark Johnson
David A. Wagner
Kannan Ramchandran
Published in:
TCC (2004)
Keyphrases
</>
encryption key
encryption scheme
encrypted data
standard model
security analysis
encryption algorithm
third party
public key
digital content
data sharing
secret key
sensitive data
ciphertext
lossless compression
read write
privacy preserving
databases
data management
social networks