Login / Signup
Efficiently Obfuscating Re-Encryption Program under DDH Assumption.
Akshayaram Srinivasan
C. Pandu Rangan
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
multi agent
security properties
real world
artificial intelligence
image encryption
real time
data sets
data mining
high security
encryption algorithms