Back to Results
First PageMeta Content
Security / Semantic security / Advantage / Secrecy / Proxy re-encryption / Obfuscation / RSA / Encryption / Hardware obfuscation / Cryptography / Cyberwarfare / Ciphertext indistinguishability


Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡
Add to Reading List

Document Date: 2010-02-04 10:25:07


Open Document

File Size: 303,87 KB

Share Result on Facebook
UPDATE