Login / Signup
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption.
Akshayaram Srinivasan
Chandrasekaran Pandu Rangan
Published in:
ACNS (2017)
Keyphrases
</>
machine learning
real time
data mining
artificial intelligence
information systems
multiscale
expert systems
relational databases
access control
computer programs
encryption scheme
program execution