Abstract
Fine-grained cryptographic primitives are secure against adversaries with bounded resources and can be computed by honest users with less resources th......
小提示:本篇文献需要登录阅读全文,点击跳转登录