Login / Signup
Hidden-Token Searchable Public-Key Encryption.
Cong Zuo
Jun Shao
Zhe Liu
Yun Ling
Guiyi Wei
Published in:
TrustCom/BigDataSE/ICESS (2017)
Keyphrases
</>
public key encryption
proxy re encryption
digital libraries
public key
standard model
encryption scheme
information systems
relational databases
multiresolution
ciphertext