Login / Signup

UC-Secure Non-interactive Public-Key Encryption.

Jan CamenischAnja LehmannGregory NevenKai Samelin
Published in: CSF (2017)
Keyphrases
  • public key encryption
  • proxy re encryption
  • public key
  • encryption scheme
  • standard model
  • identity based encryption
  • information systems
  • xml documents
  • security analysis