Login / Signup
On the Power of Hierarchical Identity-Based Encryption.
Mohammad Mahmoody
Ameer Mohammed
Published in:
EUROCRYPT (2) (2016)
Keyphrases
</>
identity based encryption
standard model
public key
security model
encryption scheme
proxy re encryption
provably secure
ciphertext
public key encryption
power consumption
security analysis
cca secure
secret key
signature scheme
lightweight
image compression
sensor networks
search engine
information retrieval