Login / Signup
On the application of generic CCA-secure transformations to proxy re-encryption.
David Nuñez
Isaac Agudo
Javier López
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
proxy re encryption
cca secure
standard model
encryption scheme
databases
keyword search
relational databases
ciphertext