Abstract
We present a new strategy for partitioning proofs, and use it to obtain new tightly secure encryption schemes. Specifically, we provide the following ......
小提示:本篇文献需要登录阅读全文,点击跳转登录