• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

On the Power of Public-Key Encryption in Secure Computation.

Mohammad MahmoodyHemanta K. MajiManoj Prabhakaran
Published in: TCC (2014)
Keyphrases
  • public key encryption
  • public key
  • proxy re encryption
  • power consumption
  • encryption scheme
  • security analysis
  • information retrieval
  • similarity measure
  • standard model
  • data management
  • security model