Login / Signup
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Bo Qin
Qianhong Wu
Lei Zhang
Josep Domingo-Ferrer
Published in:
ICICS (2010)
Keyphrases
</>
public key encryption
ciphertext
proxy re encryption
encryption scheme
public key
security model
intrusion detection
identity based encryption
access control
standard model
keyword search
security issues
databases
information security
secure communication
network security
security policies
authentication protocol