Non-transferability in Proxy Re-Encryption Revisited.
Arinjita PaulLihua WangS. Sharmila Deva SelviC. Pandu RanganPublished in: J. Internet Serv. Inf. Secur. (2020)
Keyphrases
- proxy re encryption
- standard model
- security model
- keyword search
- ciphertext
- public key encryption
- public key
- cca secure
- encryption scheme
- identity based encryption
- search engine
- security analysis
- machine learning
- access control
- signature scheme
- security requirements
- secret key
- database
- data management
- web search
- data warehouse
- relational databases
- keywords
- databases