Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting.
Juyan LiChunguang MaZhen GuPublished in: Int. J. Found. Comput. Sci. (2020)
Keyphrases
- public key
- proxy re encryption
- standard model
- security model
- public key encryption
- keyword search
- ciphertext
- security analysis
- digital signature
- signature scheme
- encryption scheme
- public key cryptography
- identity based encryption
- private key
- image authentication
- secret key
- authentication protocol
- cca secure
- secure communication
- rfid tags
- public key cryptosystem
- data sources
- provably secure
- structured data
- xml documents