Login / Signup
Threshold Proxy Re-encryption and Its Application in Blockchain.
Xi Chen
Yun Liu
Yong Li
Changlu Lin
Published in:
ICCCS (4) (2018)
Keyphrases
</>
proxy re encryption
standard model
security model
keyword search
ciphertext
public key encryption
public key
data streams
encryption scheme
database
machine learning
distributed systems
peer to peer
access control