Login / Signup
Fair Threshold Decryption with Semi-Trusted Third Parties.
Jeongdae Hong
Jinil Kim
Jihye Kim
Matthew K. Franklin
Kunsoo Park
Published in:
ACISP (2009)
Keyphrases
</>
mobile devices
third party
personal information
sensitive information
mashup
database
encryption scheme
encrypted data
data sharing
secret key
encryption algorithm