Login / Signup
Simulation-Based Bi-Selective Opening Security for Public Key Encryption.
Junzuo Lai
Rupeng Yang
Zhengan Huang
Jian Weng
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
public key encryption
public key
encryption scheme
proxy re encryption
business intelligence
standard model
ciphertext
intrusion detection
network security
web pages
keywords
low cost
key management