Login / Signup
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities.
Fucai Luo
Saif Al-Kuwari
Haiyan Wang
Xingfu Yan
Published in:
Theor. Comput. Sci. (2024)
Keyphrases
</>
encryption algorithms
encryption algorithm
real time
learning algorithm
security properties
key exchange
data encryption