Login / Signup
Related Randomness Security for Public Key Encryption, Revisited.
Takahiro Matsuda
Jacob C. N. Schuldt
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
public key encryption
proxy re encryption
information security
encryption scheme
standard model
security requirements
ciphertext
intrusion detection
access control
quality of service
database
public key
security mechanisms
key management
data model
database systems
information systems