Abstract
Suppose a user wants to broadcast an encrypted message to K recipients. With public-key encryption, the sender would construct K different ciphertexts......
小提示:本篇文献需要登录阅读全文,点击跳转登录