| Document Date: 2013-12-17 11:16:56 Open Document File Size: 313,43 KBShare Result on Facebook
/ Facility Kapodistrian University of Athens / / IndustryTerm Σ-protocols / knowledge protocol / knowledge extractor algorithm / probabilistic algorithm / regular algorithms / public recovering algorithm / involved recoverability algorithm / identification protocol / prover interactive algorithm / knowledge protocols / recoverability algorithm / e-payments / hardware device / identification systems / box algorithm / / Organization University of Connecticut / PKI / University of Athens / / Person Qiang Tang / Forking Lemma / / Position extractor / IND-CPA / knowledge extractor / standard IND-CPA / General / / Technology encryption / leakage-deterring encryption / Cryptography / EnKey protocol / recoverability algorithm / public key / prover interactive algorithm / leakagedeterring public-key encryption / public-key encryption / Leakage-deterring Public Key Encryption / PKI / box algorithm / knowledge extractor algorithm / recovering algorithm / identification protocol / private key / Verify algorithms / involved recoverability algorithm / secret key / knowledge protocol / public recovering algorithm / digital signature / leakage-deterring public-key encryption / Rec algorithm / regular algorithms / knowledge protocols / probabilistic algorithm / /
SocialTag |