50
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Predicate Privacy in Encryption Systems

      other
      , ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Identity-Based Cryptosystems and Signature Schemes

          Adi Shamir (1985)
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Ciphertext-Policy Attribute-Based Encryption

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Evaluating 2-DNF Formulas on Ciphertexts

                Bookmark

                Author and book information

                Book Chapter
                2009
                : 457-473
                10.1007/978-3-642-00457-5_27
                50987a8e-4de4-487d-a192-b933d1ed94cf
                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,122

                Cited by36