Efficiently obfuscating re-encryption program under DDH assumption

From MaRDI portal
Publication:6487206






Cites work







This page was built for publication: Efficiently obfuscating re-encryption program under DDH assumption

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6487206)