Verifiable Proxy Re-encryption from Indistinguishability Obfuscation.
Muhua LiuYing WuJinyong ChangRui XueWei GuoPublished in: ICICS (2015)
Keyphrases
- proxy re encryption
- encryption scheme
- secret sharing
- standard model
- ciphertext
- secret sharing scheme
- security analysis
- reverse engineering
- public key encryption
- public key
- security model
- secret key
- data sharing
- keyword search
- malware detection
- hash functions
- lossless compression
- information retrieval
- database
- cost effective
- low cost
- object oriented
- relational databases
- provably secure
- databases