Login / Signup

Embedding Lemmas for Functional Encryption.

Ryo KatoNaohisa NishidaRyo HiranoTatsumi ObaYuji UnagamiShota YamadaTadanori TeruyaNuttapong AttrapadungTakahiro MatsudaGoichiro Hanaoka
Published in: ISITA (2018)
Keyphrases
  • information hiding
  • data hiding
  • theorem proving
  • graph embedding
  • functional analysis
  • random number
  • vector space
  • theorem prover
  • encryption scheme
  • digital signature
  • key exchange
  • digital rights management