Login / Signup

Fogging the cloud - Implementing and evaluating searchable encryption schemes in practice.

Manuel KoschuchMichael HombauerSigrid Schefer-WenzlUlrich HaböckStefan Hrdlicka
Published in: IM (2015)
Keyphrases
  • encryption scheme
  • cloud computing
  • standard model
  • proxy re encryption
  • public key
  • ciphertext
  • secret sharing scheme
  • public key encryption
  • digital libraries
  • homomorphic encryption
  • cca secure