Abstract
Motivated by applications in large storage systems, we initiate the study of incremental deterministic public-key encryption. Deterministic public-key......
小提示:本篇文献需要登录阅读全文,点击跳转登录