Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Shweta AgrawalFuyuki KitagawaAnuja ModiRyo NishimakiShota YamadaTakashi YamakawaPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- special case
- turing machine
- security properties
- access control
- encryption algorithms
- data encryption
- security requirements
- encryption scheme
- high security
- encryption decryption
- cryptographic algorithms
- restrictive assumptions
- security level
- security issues
- statistical databases
- information security
- intrusion detection