Login / Signup
On the Power of Public-key Encryption in Secure Computation.
Mohammad Mahmoody
Hemanta K. Maji
Manoj Prabhakaran
Published in:
Electron. Colloquium Comput. Complex. (2013)
Keyphrases
</>
public key encryption
proxy re encryption
public key
encryption scheme
power consumption
relational databases
security analysis
lightweight
data integration
efficient computation