Bounded Leakage Resilient Functional Encryption with Hidden Vector Predicate
Recent research shows that many public-key or identity-based encryption schemes are vulnerable to<br /> side-channel attacks on the keys by the interaction of an adversary with a physical device. To tolerate<br /> the possible key leakage, leakage-resilient cryptography models a class of
用户评论