Login / Signup
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme.
Yupu Hu
Siyue Dong
Baocang Wang
Jun Liu
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
encryption scheme
standard model
security analysis
mpeg video
public key
cca secure
diffie hellman
secret key
ciphertext
data sharing
security model
image encryption scheme
hash functions
encryption key
lossless compression
databases
identity based encryption
public key encryption
proxy re encryption
high quality