• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server.

Giovanni Di CrescenzoMatluba KhodjaevaDelaram KahrobaeiVladimir Shpilrain
Published in: CCSW@CCS (2017)
Keyphrases
  • real world
  • database
  • information systems
  • information technology
  • lightweight
  • privacy preserving
  • client server
  • key management
  • application level
  • key distribution