Login / Signup
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting.
Xiang Xie
Rui Xue
Rui Zhang
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
public key encryption
identity based encryption
standard model
proxy re encryption
public key
security model
ciphertext
encryption scheme
provably secure
keyword search
secret key
cca secure
signature scheme