Login / Signup
RKA Secure PKE Based on the DDH and HR Assumptions.
Dingding Jia
Xianhui Lu
Bao Li
Qixiang Mei
Published in:
ProvSec (2013)
Keyphrases
</>
database systems
case study
lightweight
sensitive data
security analysis
security protocols
simplifying assumptions
security issues
security mechanisms
key management
independence assumption
security properties
security management
underlying assumptions
covert channel