Login / Signup
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
Shweta Agrawal
Benoît Libert
Damien Stehlé
Published in:
CRYPTO (3) (2016)
Keyphrases
</>
key management
key exchange
encryption scheme
data encryption
digital signature
cryptographic protocols
security properties
stream cipher
encryption decryption
security analysis
ciphertext
authentication scheme