Login / Signup
Securely Obfuscating Re-Encryption.
Susan Hohenberger
Guy N. Rothblum
Abhi Shelat
Vinod Vaikuntanathan
Published in:
J. Cryptol. (2011)
Keyphrases
</>
image encryption
encryption algorithms
secret key
encryption scheme
security properties
key management
data encryption
security analysis
digital signature
key exchange
multimedia streaming
database
neural network
public key
ciphertext
private data