Sign in

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.

Allison B. LewkoBrent Waters
Published in: CRYPTO (2012)
Keyphrases
  • information security
  • nearest neighbor
  • security requirements