Login / Signup
On the Power of Public-Key Encryption in Secure Computation.
Mohammad Mahmoody
Hemanta K. Maji
Manoj Prabhakaran
Published in:
TCC (2014)
Keyphrases
</>
public key encryption
public key
proxy re encryption
power consumption
encryption scheme
security analysis
information retrieval
similarity measure
standard model
data management
security model