Various Proxy Re-Encryption Schemes from Lattices.Xiong Fan,Feng-Hao LiuIACR Cryptology ePrint Archive(2016)引用 23|浏览38暂无评分AI 理解论文溯源树样例生成溯源树,研究论文发展脉络