Functional encryption for bounded collusions, revisited

From MaRDI portal







Cited in
(25)






This page was built for publication: Functional encryption for bounded collusions, revisited

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1690192)