Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Search by expertise, name or affiliation
Achieving key privacy without losing CCA security in proxy re-encryption
Jun Shao,
Peng Liu
, Yuan Zhou
College of Information Sciences and Technology
Research output
:
Contribution to journal
›
Article
›
peer-review
18
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Achieving key privacy without losing CCA security in proxy re-encryption'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
CCA Security
100%
Key Privacy
100%
Diffie-Hellman Assumption
16%
Computational Diffie-Hellman Assumption
16%
Encrypted Email
16%
Computational Diffie-Hellman Problem
16%
Computer Science
proxy re encryption
100%
Encryption Scheme
50%
Ciphertext
33%
Diffie-Hellman-Merkle key exchange
33%
public key
16%
e-Mail
16%
Security Requirements
16%