Login / Signup

Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server.

Giovanni Di CrescenzoMatluba KhodjaevaDelaram KahrobaeiVladimir Shpilrain
Published in: CCSW@CCS (2017)
Keyphrases
  • real world
  • database
  • information systems
  • information technology
  • lightweight
  • privacy preserving
  • client server
  • key management
  • application level
  • key distribution