Login / Signup
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting.
Xiang Xie
Rui Xue
Rui Zhang
Published in:
SCN (2012)
Keyphrases
</>
public key encryption
identity based encryption
standard model
proxy re encryption
public key
security model
encryption scheme
provably secure
ciphertext
information systems
databases
secret key
cca secure
hash functions
signature scheme
security analysis