Constrained pseudorandom functions from functional encryption.
Pratish DattaPublished in: Theor. Comput. Sci. (2020)
Keyphrases
- pseudorandom
- random number
- secret key
- encryption algorithm
- stream cipher
- uniformly distributed
- functional properties
- random numbers
- smart card
- functional language
- encryption decryption
- authentication scheme
- encryption scheme
- public key
- hash functions
- functional units
- access control
- encryption algorithms
- feature selection