Login / Signup
Constrained (Verifiable) Pseudorandom Function from Functional Encryption.
Pratish Datta
Published in:
ISPEC (2018)
Keyphrases
</>
pseudorandom
random number
secret key
encryption algorithm
stream cipher
uniformly distributed
encryption algorithms
encryption scheme
real time
high dimensional
sufficient conditions
functional properties