Login / Signup
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE.
Peihan Miao
Sikhar Patranabis
Gaven Watson
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
proxy re encryption
ciphertext
encryption scheme
standard model
secret key
identity based encryption
public key encryption
cca secure
public key
security model
security analysis
keyword search
private key
diffie hellman
relational databases
data management
databases