Login / Signup
On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature.
Xu An Wang
Xiaoyuan Yang
Published in:
CIT (2) (2009)
Keyphrases
</>
proxy re encryption
standard model
security model
keyword search
signature scheme
public key
ddos attacks
ciphertext
public key encryption
search engine
encryption scheme
private key
security analysis
cca secure
digital signature
dos attacks