Login / Signup

Evolution of the Polar Code-Based Encryption Schemes.

Chen AnYing LiuXianhui Lu
Published in: GLOBECOM (Workshops) (2021)
Keyphrases
  • encryption scheme
  • standard model
  • security analysis
  • public key
  • secret key
  • ciphertext
  • security model
  • secret sharing scheme
  • proxy re encryption
  • public key encryption
  • database management systems
  • cca secure