Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Runhua XuJames JoshiPublished in: TPS-ISA (2020)
Keyphrases
- data encryption
- key exchange
- key management
- encryption scheme
- stream cipher
- digital signature
- security properties
- cryptographic protocols
- efficient computation
- public key cryptography
- high security
- integrity verification
- encryption decryption
- cryptographic algorithms
- data confidentiality
- identity authentication
- security analysis
- security issues
- digital rights management
- private key
- encryption algorithm