Trapdoor security in a searchable public-key encryption scheme with a designated tester.
Hyun Sook RheeJong Hwan ParkWilly SusiloDong Hoon LeePublished in: J. Syst. Softw. (2010)
Keyphrases
- data model
- public key encryption scheme
- public key
- forward secure
- ciphertext
- cca secure
- standard model
- encryption scheme
- data integration
- database systems
- chosen ciphertext
- secret key
- xml documents
- blind signature scheme
- public key cryptosystem
- security analysis
- data sources
- digital signature
- diffie hellman
- public key cryptography
- security model
- signcryption scheme
- private key
- signature scheme
- security issues
- blind signature
- cryptographic protocols
- proxy re encryption
- rfid tags
- relational databases
- digital libraries