Summary
This deliverable describes the requirements for hardware-supported functional encryption schemes, including trust, adversary, and security models from the analysis of Task 5.1.
More information & hyperlinks