Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
Yutaka KawaiTakahiro MatsudaTakato HiranoYoshihiro KosekiGoichiro HanaokaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2019)
Keyphrases
- ciphertext
- proxy re encryption
- encryption scheme
- standard model
- public key
- secret key
- security analysis
- public key encryption
- encryption algorithm
- data sharing
- hash functions
- lossless compression
- s box
- security model
- private key
- keyword search
- secret sharing scheme
- cost effective
- cryptographic protocols
- provably secure
- fault model
- similarity search
- database