作者: Cong Zuo , Jun Shao , Guiyi Wei , Mande Xie , Min Ji
DOI: 10.1016/J.FUTURE.2016.10.028
关键词:
摘要: … i ) , where dk is a decryption key corresponding to I k , and it would be a private key d if the input ciphertext C i is an original ciphertext, or rk corresponding to I k and index i if C i is a …