Login / Signup

Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities.

Fucai LuoSaif Al-KuwariHaiyan WangXingfu Yan
Published in: Theor. Comput. Sci. (2024)
Keyphrases
  • encryption algorithms
  • encryption algorithm
  • real time
  • learning algorithm
  • security properties
  • key exchange
  • data encryption