Posted By
Tags
- 04
- A
- Administrator
- Adversary
- Algorithm
- Algorithms
- An
- Analysis
- Application
- Attack
- Authority
- Authorization
- Authorized
- Basi
- Basis
- Beijing
- Boneh
- Bottleneck
- Chen
- Chen Hong
- Ciphertext
- Commodity
- Comparison
- Complexity
- Comprehensive
- Computation
- Computing
- Concern
- Conduct
- Construction
- Data
- Distribution
- Efficient
- Enabling
- Encryption
- E.T.
- EuroCrypt
- Evaluation
- Evaluations
- Exclusive
- Existence
- Fight
- Focusing
- Generate
- Hong Kong
- Hong Kong Polytechnic University
- ID-based encryption
- Implementation
- Information needs
- Key management
- Keyword
- Kong
- Lattice
- Leverage
- Machine
- Mechanism
- Need
- Needs
- Normal
- Novel
- Paper
- Parameter
- PEAKS
- Perform
- Permit
- Polytechnic
- Posse
- Possession
- Primitives
- Privilege
- Properties
- Public-key cryptography
- Quantum
- Quantum computing
- Reduction
- Research
- Resist
- Restrict
- Result
- Sampling
- Scenarios
- Scheme
- Search
- Searchability
- Search algorithm
- Searching
- Secure
- Security
- Select
- Set
- Sets
- Space
- Specific
- Targeted
- Term
- Terms
- The authority
- The first
- Theory
- Tier
- Tiers
- Time period
- Trapdoor
- University
- Variant
- Variation
- Vulnerable