Login / Signup
Proof-of-possession for KEM certificates using verifiable generation.
Tim Güneysu
Philip Hodges
Georg Land
Mike Ounsworth
Douglas Stebila
Greg Zaverucha
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
databases
theorem proving
theorem prover
artificial intelligence
objective function
access control
generation process
case study
database systems
face recognition
sufficient conditions
generation method
automated theorem proving
proof theory