Non-Interactive Publicly-Verifiable Delegation of Committed Programs.
Riddhi GhosalAmit SahaiBrent WatersPublished in: Public Key Cryptography (2) (2023)
Keyphrases
- access control
- user friendly
- databases
- computer programs
- neural network
- access control systems
- role based access control
- intermediate level
- interactive learning
- programming environment
- cross domain
- computer graphics
- user interaction
- sufficient conditions
- wireless sensor networks
- expert systems
- multi agent systems
- case study