Login / Signup

How to Build a Trapdoor Function from an Encryption Scheme.

Sanjam GargMohammad HajiabadiGiulio MalavoltaRafail Ostrovsky
Published in: ASIACRYPT (3) (2021)
Keyphrases
  • encryption scheme
  • ciphertext
  • standard model
  • mpeg video
  • security analysis
  • cca secure
  • public key
  • secret key
  • digital libraries
  • nearest neighbor
  • image compression