![PDF] An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme | Semantic Scholar PDF] An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/fb79f18c0685f9786ce0ef495ff845e0ac50c142/2-Figure1-1.png)
PDF] An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme | Semantic Scholar
![PDF) Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption PDF) Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption](https://i1.rgstatic.net/publication/366842676_Hierarchical_Identity_Based_Inner_Product_Functional_Encryption_for_Privacy_Preserving_Statistical_Analysis_Without_q-type_Assumption/links/63ce2473d7e5841e0beda6d4/largepreview.png)
PDF) Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption
![Cryptography with Advanced Functionality - Research - Advanced Cryptography Research Team | Cyber Physical Security Research Center - AIST Cryptography with Advanced Functionality - Research - Advanced Cryptography Research Team | Cyber Physical Security Research Center - AIST](https://www.cpsec.aist.go.jp/team/acrt/research/research01/r01-01e.png)
Cryptography with Advanced Functionality - Research - Advanced Cryptography Research Team | Cyber Physical Security Research Center - AIST
![Fujitsu Develops World's First Homomorphic Encryption Technology that Enables Statistical Calculations and Biometric Authentication - Fujitsu Global Fujitsu Develops World's First Homomorphic Encryption Technology that Enables Statistical Calculations and Biometric Authentication - Fujitsu Global](https://www.fujitsu.com/global/Images/20130828-01b_tcm100-929720.jpg)
Fujitsu Develops World's First Homomorphic Encryption Technology that Enables Statistical Calculations and Biometric Authentication - Fujitsu Global
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
![PPT) 1 Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption 2012 / 4 / 18 Tatsuaki Okamoto ( NTT ), Katsuyuki Takashima ( Mitsubishi Electric - DOKUMEN.TIPS PPT) 1 Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption 2012 / 4 / 18 Tatsuaki Okamoto ( NTT ), Katsuyuki Takashima ( Mitsubishi Electric - DOKUMEN.TIPS](https://img.dokumen.tips/doc/image/5515de4455034638038b4ad6/1-adaptively-attribute-hiding-hierarchical-inner-product-encryption-2012-4-18-tatsuaki-okamoto-ntt-katsuyuki-takashima-mitsubishi-electric.jpg)
PPT) 1 Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption 2012 / 4 / 18 Tatsuaki Okamoto ( NTT ), Katsuyuki Takashima ( Mitsubishi Electric - DOKUMEN.TIPS
![Efficient functional encryption for inner product with simulation-based security | Cybersecurity | Full Text Efficient functional encryption for inner product with simulation-based security | Cybersecurity | Full Text](https://media.springernature.com/lw685/springer-static/image/art%3A10.1186%2Fs42400-020-00067-1/MediaObjects/42400_2020_67_Fig1_HTML.png)
Efficient functional encryption for inner product with simulation-based security | Cybersecurity | Full Text
![Sensors | Free Full-Text | Efficient and Privacy-Preserving Energy Trading on Blockchain Using Dual Binary Encoding for Inner Product Encryption Sensors | Free Full-Text | Efficient and Privacy-Preserving Energy Trading on Blockchain Using Dual Binary Encoding for Inner Product Encryption](https://www.mdpi.com/sensors/sensors-21-02024/article_deploy/html/images/sensors-21-02024-g004.png)
Sensors | Free Full-Text | Efficient and Privacy-Preserving Energy Trading on Blockchain Using Dual Binary Encoding for Inner Product Encryption
![PDF] Hierarchical identity-based inner product functional encryption by Ge Song, Yuqiao Deng, Qiong Huang, Changgen Peng, Chunming Tang, Xiaohua Wang · 10.1016/j.ins.2021.05.062 · OA.mg PDF] Hierarchical identity-based inner product functional encryption by Ge Song, Yuqiao Deng, Qiong Huang, Changgen Peng, Chunming Tang, Xiaohua Wang · 10.1016/j.ins.2021.05.062 · OA.mg](https://og.oa.mg/Hierarchical%20identity-based%20inner%20product%20functional%20encryption.png?author=%20Ge%20Song,%20Yuqiao%20Deng,%20Qiong%20Huang,%20Changgen%20Peng,%20Chunming%20Tang,%20Xiaohua%20Wang)