Login / Signup

Threshold Proxy Re-encryption and Its Application in Blockchain.

Xi ChenYun LiuYong LiChanglu Lin
Published in: ICCCS (4) (2018)
Keyphrases
  • proxy re encryption
  • standard model
  • security model
  • keyword search
  • ciphertext
  • public key encryption
  • public key
  • data streams
  • encryption scheme
  • database
  • machine learning
  • distributed systems
  • peer to peer
  • access control