Login / Signup
New construction of identity-based proxy re-encryption.
Song Luo
Jian-bin Hu
Zhong Chen
Published in:
Digital Rights Management Workshop (2010)
Keyphrases
</>
proxy re encryption
standard model
ciphertext
keyword search
identity based encryption
security model
encryption scheme
public key encryption
signcryption scheme
public key
key management
cca secure
signature scheme
relational databases
secret key
xml data
diffie hellman
cost effective
intrusion detection