Login / Signup
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p.
Guilhem Castagnos
Fabien Laguillaumie
Ida Tucker
Published in:
ASIACRYPT (2) (2018)
Keyphrases
</>
data encryption
encryption scheme
key exchange
security properties
key management
security analysis
digital signature
digital rights management
real world
stream cipher
cryptographic algorithms
peer to peer
information hiding
cryptographic protocols
integrity verification