Login / Signup
An Efficient Receiver Deniable Encryption Scheme and Its Applications.
Bo Meng
JiangQing Wang
Published in:
J. Networks (2010)
Keyphrases
</>
encryption scheme
authentication protocol
security analysis
public key
secret key
identity based encryption
standard model
security model
cca secure
proxy re encryption
data sharing
ciphertext
public key encryption
smart card
lossless compression
public key cryptosystem
lightweight
nearest neighbor
databases