Login / Signup
SoK: Public Key Encryption with Openings.
Carlo Brunetta
Hans Heum
Martijn Stam
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
public key encryption
proxy re encryption
public key
morphological operators
encryption scheme
morphological filters
standard model
ciphertext
structuring elements
security model
mathematical morphology
security analysis
diffie hellman