Login / Signup

Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.

Pratish DattaRatna DuttaSourav Mukhopadhyay
Published in: Public Key Cryptography (2) (2017)
Keyphrases
  • pseudorandom
  • uniformly distributed
  • random number
  • conflict resolution
  • neural network
  • feature extraction
  • access control
  • basis functions
  • secret key