All Stories

  1. On the power of Public-key Function-Private Functional Encryption
  2. Receiver and Sender Deniable Functional Encryption