Write, autoreview, editor, reviewer
3,129
edits
Line 30: | Line 30: | ||
*''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server. | *''Circular Security'' This protocol has a stronger notion of circular security where not only the secret key but also the trapdoor functions are encrypted when provided to the Server. | ||
== Notation == | == Notation == | ||
*<math>\lambda</math>: security parameter | |||
* <math>k</math>: security parameter | * <math>k</math>: security parameter | ||
* <math>\tilde{x}</math>: encrypted pad key | * <math>\tilde{x}</math>: encrypted pad key |