@dblp

Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm.

, , , and . EIDWT, volume 6 of Lecture Notes on Data Engineering and Communications Technologies, page 199-211. Springer, (2017)

Links and resources

URL:
BibTeX key:
conf/eidwt/PingWZW17
search on:

Comments and Reviews  
(0)

There is no review or comment yet. You can write one!

Tags


Cite this publication