Login / Signup
Inference Attacks on Fuzzy Searchable Encryption Schemes.
Daniel Homann
Lena Wiese
Published in:
Trans. Data Priv. (2019)
Keyphrases
</>
encryption scheme
standard model
public key
security analysis
identity based encryption
digital libraries
data sharing
ciphertext
hash functions
lossless compression
security model
proxy re encryption
encryption key
public key encryption
data structure
high dimensional