Login / Signup
How to Build a Trapdoor Function from an Encryption Scheme.
Sanjam Garg
Mohammad Hajiabadi
Giulio Malavolta
Rafail Ostrovsky
Published in:
ASIACRYPT (3) (2021)
Keyphrases
</>
encryption scheme
ciphertext
standard model
mpeg video
security analysis
cca secure
public key
secret key
digital libraries
nearest neighbor
image compression