Login / Signup

Hidden-Token Searchable Public-Key Encryption.

Cong ZuoJun ShaoZhe LiuYun LingGuiyi Wei
Published in: TrustCom/BigDataSE/ICESS (2017)
Keyphrases
  • public key encryption
  • proxy re encryption
  • digital libraries
  • public key
  • standard model
  • encryption scheme
  • information systems
  • relational databases
  • multiresolution
  • ciphertext