Keyphrases
- proxy re encryption
- standard model
- keyword search
- security model
- public key encryption
- ciphertext
- public key
- access control
- encryption scheme
- peer to peer
- cca secure
- keywords
- databases
- identity based encryption
- relational databases
- information retrieval
- xml data
- security requirements
- search engine
- structured data
- anomaly detection
- image compression