Login / Signup
Fully-Anonymous Functional Proxy-Re-Encryption.
Yutaka Kawai
Katsuyuki Takashima
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
proxy re encryption
standard model
security model
keyword search
ciphertext
public key
encryption scheme
data management
public key encryption
machine learning
data structure
query processing
peer to peer
signature scheme
cca secure
identity based encryption