<--- Back to Details
First PageDocument Content
Applied mathematics / Ciphertext indistinguishability / Public-key cryptography / Semantic security / RSA / Cipher / ID-based encryption / Probabilistic encryption / Authenticated encryption / Cryptography / Cyberwarfare / Security
Date: 2014-07-24 01:51:53
Applied mathematics
Ciphertext indistinguishability
Public-key cryptography
Semantic security
RSA
Cipher
ID-based encryption
Probabilistic encryption
Authenticated encryption
Cryptography
Cyberwarfare
Security

Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski∗ Gil Segev†

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 152,63 KB