Login / Signup

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.

Shweta AgrawalBenoît LibertDamien Stehlé
Published in: CRYPTO (3) (2016)
Keyphrases
  • key management
  • key exchange
  • encryption scheme
  • data encryption
  • digital signature
  • cryptographic protocols
  • security properties
  • stream cipher
  • encryption decryption
  • security analysis
  • ciphertext
  • authentication scheme