Login / Signup
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability.
Elette Boyle
Saleet Klein
Alon Rosen
Gil Segev
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
malicious behavior
encryption scheme
information security
malicious attacks
databases
cloud computing
database programming
standard model
security model
ciphertext
detect malicious