CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.
Yi ZhaoKaitai LiangBo YangLiqun ChenPublished in: Secur. Commun. Networks (2019)
Keyphrases
- proxy re encryption
- public key encryption
- cca secure
- identity based encryption
- encryption scheme
- standard model
- ciphertext
- keyword search
- security model
- public key
- public key cryptosystem
- provably secure
- security analysis
- search engine
- database systems
- secret key
- data sharing
- structured data
- motion estimation
- xml documents