Login / Signup
Function-Hiding Inner Product Encryption is Practical.
Sam Kim
Kevin Lewi
Avradip Mandal
Hart William Montgomery
Arnab Roy
David J. Wu
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
practical application
encryption scheme
data sets
databases
real world
real time
learning algorithm
access control