Wei, Zhang - In: International Journal of Technology and Human … 12 (2016) 2, pp. 72-82
decision problem. The authors give a concrete security model and detailed security analysis. … one, which can do infinite additions and one multiplication operation. Security of the scheme is based on subgroup …