Login / Signup

Effort-Release Public-Key Encryption from Cryptographic Puzzles.

Jothi RangasamyDouglas StebilaColin BoydJuan Manuel González NietoLakshmi Kuppusamy
Published in: ACISP (2012)
Keyphrases
  • public key encryption
  • public key
  • proxy re encryption
  • encryption scheme
  • keyword search
  • database
  • database systems
  • inter frame
  • standard model
  • security model