Login / Signup
Traitor Tracing without Trusted Authority from Registered Functional Encryption.
Pedro Branco
Russell W. F. Lai
Monosij Maitra
Giulio Malavolta
Ahmadreza Rahimi
Ivy K. Y. Woo
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
link analysis
distributed environment
encryption scheme
image encryption
real time
databases
information systems
digital libraries
key management
functional analysis