Login / Signup
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
Chengyu Hu
Pengtao Liu
Shanqing Guo
Published in:
J. Ambient Intell. Humaniz. Comput. (2016)
Keyphrases
</>
block cipher
public key encryption
security mechanisms
lightweight
cryptographic protocols
search engine
high dimensional
watermarking scheme
information leakage