Login / Signup
Functional Encryption for Bounded Collusions, Revisited.
Shweta Agrawal
Alon Rosen
Published in:
TCC (1) (2017)
Keyphrases
</>
functional analysis
key management
encryption algorithms
information retrieval
secret key
real world
information systems