Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption
2011 ◽
pp. 299-306
◽
2010 ◽
Vol E93-A
(11)
◽
pp. 1984-1993
◽
2012 ◽
Vol 2
(4)
◽
pp. 304
◽
2006 ◽
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
2013 ◽
Vol 90
(12)
◽
pp. 2581-2587
◽
Keyword(s):