Login / Signup
Verifiable Decryption for BGV.
Tjerand Silde
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
secret sharing
secure communication
encryption scheme
sufficient conditions
encryption algorithm
secret key
databases
unauthorized access
database
machine learning
multi agent systems
access control
encryption decryption