Sign in

Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system.

Shuai HanShengli LiuLin Lyu
Published in: Des. Codes Cryptogr. (2018)
Keyphrases
  • data structure
  • high level
  • hash functions
  • security mechanisms
  • security issues
  • social networks
  • recommender systems
  • user profiles