Login / Signup

Functional Encryption for Bounded Collusions, Revisited.

Shweta AgrawalAlon Rosen
Published in: TCC (1) (2017)
Keyphrases
  • functional analysis
  • key management
  • encryption algorithms
  • information retrieval
  • secret key
  • real world
  • information systems