• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

On the application of generic CCA-secure transformations to proxy re-encryption.

David NuñezIsaac AgudoJavier López
Published in: Secur. Commun. Networks (2016)
Keyphrases
  • proxy re encryption
  • cca secure
  • standard model
  • encryption scheme
  • databases
  • keyword search
  • relational databases
  • ciphertext