Login / Signup

Efficiently Obfuscating Re-Encryption Program Under DDH Assumption.

Akshayaram SrinivasanChandrasekaran Pandu Rangan
Published in: ACNS (2017)
Keyphrases
  • machine learning
  • real time
  • data mining
  • artificial intelligence
  • information systems
  • multiscale
  • expert systems
  • relational databases
  • access control
  • computer programs
  • encryption scheme
  • program execution