Login / Signup
Identity Based Key-Insulated Encryption with Outsourced Equality Test.
Seth Alornyo
Yanan Zhao
Guobin Zhu
Hu Xiong
Published in:
Int. J. Netw. Secur. (2020)
Keyphrases
</>
encryption scheme
key management
ciphertext
third party
data sharing
test cases
data sets
relational databases
signature scheme
security analysis
identity based cryptography