Login / Signup
UC-Secure Non-interactive Public-Key Encryption.
Jan Camenisch
Anja Lehmann
Gregory Neven
Kai Samelin
Published in:
CSF (2017)
Keyphrases
</>
public key encryption
proxy re encryption
public key
encryption scheme
standard model
identity based encryption
information systems
xml documents
security analysis