Login / Signup
What About Bob? The Inadequacy of CPA Security for Proxy Reencryption.
Aloni Cohen
Published in:
Public Key Cryptography (2) (2019)
Keyphrases
</>
information security
security issues
ring signature scheme
access control
security requirements
computer security
security policies
security mechanisms
network security
functional requirements
privacy enhancing
database systems