Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.
Qiqi LaiFeng-Hao LiuZhedong WangPublished in: Public Key Cryptography (1) (2020)
Keyphrases
- encryption scheme
- information security
- lower bound
- upper bound
- access control
- query expansion
- network security
- cca secure
- pseudo relevance feedback
- statistical databases
- security policies
- learning algorithm
- document retrieval
- security mechanisms
- security protocols
- security threats
- intrusion detection
- security issues
- security analysis
- cyber security
- security problems
- public key encryption