Login / Signup

Constrained (Verifiable) Pseudorandom Function from Functional Encryption.

Pratish Datta
Published in: ISPEC (2018)
Keyphrases
  • pseudorandom
  • random number
  • secret key
  • encryption algorithm
  • stream cipher
  • uniformly distributed
  • encryption algorithms
  • encryption scheme
  • real time
  • high dimensional
  • sufficient conditions
  • functional properties