Cryptographic ObfuscationBuilding Functional Encryption: In Search of a Seed, II
Cryptographic Obfuscation: Building Functional Encryption: In Search of a Seed, II
Horváth, Máté; Buttyán, Levente
2020-10-06 00:00:00
[In this section, we continue introducing candidate realizations of bootstrappable primitives, now focusing on those ones that yield full-fledged iO through constructing an FE scheme first. The main benefit of this approach is that—up to now—it has led to a better characterization of the problem of building iO.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/cryptographic-obfuscation-building-functional-encryption-in-search-of-eb3Fh3jwvd
Cryptographic ObfuscationBuilding Functional Encryption: In Search of a Seed, II
[In this section, we continue introducing candidate realizations of bootstrappable primitives, now focusing on those ones that yield full-fledged iO through constructing an FE scheme first. The main benefit of this approach is that—up to now—it has led to a better characterization of the problem of building iO.]
Published: Oct 6, 2020
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.