Write
262
edits
Line 45: | Line 45: | ||
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server. | *''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server. | ||
== | == Pseudocode== | ||
*Boxed texts are not part of the code but contain proofs used in various steps, illustrated for a better understanding of the protocol. | *Boxed texts are not part of the code but contain proofs used in various steps, illustrated for a better understanding of the protocol. | ||
==='''Stage 1''' Client’s Preparation=== | ==='''Stage 1''' Client’s Preparation=== |