Proxy re-encryption via indistinguishability obfuscation.
Satsuya OhataKanta MatsuuraPublished in: Secur. Commun. Networks (2016)
Keyphrases
- proxy re encryption
- encryption scheme
- standard model
- ciphertext
- reverse engineering
- security model
- public key encryption
- public key
- security analysis
- secret sharing scheme
- identity based encryption
- secret key
- keyword search
- malware detection
- data sharing
- lossless compression
- provably secure
- data sets
- smart card
- database views
- software development
- software engineering