Sign in

A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices.

Na HuaJuyan LiKejia ZhangLong Zhang
Published in: Int. J. Inf. Secur. Priv. (2022)
Keyphrases
  • database
  • databases
  • computer vision
  • threshold selection