Login / Signup
Signcryption with Proxy Re-encryption.
Chandrasekar S.
Ambika K.
C. Pandu Rangan
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
proxy re encryption
standard model
signcryption scheme
ciphertext
encryption scheme
public key encryption
security model
signature scheme
keyword search
security analysis
security properties
provably secure
database
public key
key management
private key
diffie hellman
cost effective
distributed systems