Login / Signup
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes.
Carmen Kempka
Ryo Kikuchi
Koutarou Suzuki
Published in:
ASIACRYPT (2) (2016)
Keyphrases
</>
lower bound
ciphertext
standard model
upper bound
public key encryption
encryption scheme
public key
secret key
objective function
provably secure
optimal solution
proxy re encryption
cca secure
similarity measure
data model