Login / Signup
Practical convertible authenticated encryption schemes using self-certified public keys.
Jiqiang Lv
Xinmei Wang
Kwangjo Kim
Published in:
Appl. Math. Comput. (2005)
Keyphrases
</>
encryption scheme
hash functions
secret key
ciphertext
authentication scheme
standard model
security model
database
identity based encryption
key distribution
cca secure
chosen plaintext attack
search engine
similarity search
security analysis
secret sharing scheme