Login / Signup
Towards Malicious Security of Private Coin Honest Verifier Zero Knowledge for NP via Witness Encryption.
Jingyue Yu
Published in:
Inscrypt (2018)
Keyphrases
</>
encryption scheme
encryption algorithm
security properties
stream cipher
key management
security analysis
encryption algorithms
cryptographic protocols
data protection
high security
identity authentication
encryption decryption
computational complexity
computer security
java card