Login / Signup

A publicly verifiable PCAE scheme for confidential applications with proxy delegation.

Tzong-Sun WuHan-Yu LinPei-Yih Ting
Published in: Trans. Emerg. Telecommun. Technol. (2012)
Keyphrases
  • secret sharing
  • locality sensitive
  • access control
  • object recognition
  • similarity measure
  • multimedia data