Login / Signup
K-times Proxy Re-encryption.
Xu An Wang
Ziqing Wang
Yi Ding
Shujun Bai
Published in:
CIS (2011)
Keyphrases
</>
proxy re encryption
standard model
public key encryption
security model
ciphertext
public key
information extraction
information retrieval
metadata
database systems
relational databases
query processing
keyword search
encryption scheme