Login / Signup
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE.
Théophile Brézot
Paola de Perthuis
David Pointcheval
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
response time
access control
concurrency control
distributed database systems
optimal policy
transaction processing
data sets
fine grained
random access
nested transactions