Login / Signup
Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Tsz Hon Yuen
Sherman S. M. Chow
Ye Zhang
Siu-Ming Yiu
Published in:
EUROCRYPT (2012)
Keyphrases
</>
identity based encryption
standard model
public key
security model
public key encryption
ciphertext
provably secure
proxy re encryption
encryption scheme
cca secure
access control
data access
secret key
databases