Login / Signup
Identity-Based (Lossy) Trapdoor Functions and Applications.
Mihir Bellare
Eike Kiltz
Chris Peikert
Brent Waters
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
ciphertext
data structure
data compression
databases
signature scheme