Login / Signup
Key-Private Proxy Re-Encryption.
Giuseppe Ateniese
Karyn Benson
Susan Hohenberger
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
proxy re encryption
security model
ciphertext
privacy preserving
encryption scheme
standard model
public key encryption
database systems
high dimensional
keyword search