Login / Signup
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.
Ivan Damgård
Tomasz Kazana
Maciej Obremski
Varun Raj
Luisa Siniscalchi
Published in:
TCC (2) (2018)
Keyphrases
</>
cca secure
public key encryption scheme
encryption scheme
standard model
public key cryptosystem
public key
ciphertext
proxy re encryption
forward secure
identity based encryption
security analysis
diffie hellman
operating system
data sharing
security issues
signature scheme