Witness encryption and its applications.
Sanjam GargCraig GentryAmit SahaiBrent WatersPublished in: STOC (2013)
Keyphrases
- encryption algorithms
- key exchange
- encryption scheme
- security properties
- encryption algorithm
- multimedia streaming
- image encryption
- neural network
- digital signature
- ciphertext
- low cost
- image sequences
- image authentication
- real world
- high security
- identity authentication
- data sets
- packet size
- integrity verification
- real time