摘要:In this paper, we analyze the key homomorphic technique used in constructions of functional encryption schemes and point out its weakness in efficiency. Based on this, we propose two improved homomorphic techniques and show their advantages and weaknesses through the method of comparison.