Public-Key Encryption with Tight Simulation-Based Selective-Opening Security.
Lin LyuShengli LiuShuai HanPublished in: Comput. J. (2018)
Keyphrases
- public key encryption
- public key
- proxy re encryption
- encryption scheme
- identity based encryption
- standard model
- security model
- access control
- information security
- similarity measure
- ciphertext
- intrusion detection
- database
- security issues
- network security
- security properties
- diffie hellman
- relational databases
- information retrieval
- databases