Login / Signup
Adaptively Secure Proxy Re-encryption.
Georg Fuchsbauer
Chethan Kamath
Karen Klein
Krzysztof Pietrzak
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
public key encryption
proxy re encryption
standard model
security model
cca secure
keyword search
public key
encryption scheme
ciphertext
identity based encryption
security analysis
security requirements
diffie hellman
signature scheme
search engine
digital signature
provably secure
relational databases