Login / Signup
On the Anonymity of Identity-Based Encryption.
Song Luo
Ning Hu
Published in:
J. Appl. Math. (2013)
Keyphrases
</>
identity based encryption
standard model
public key
security model
proxy re encryption
ciphertext
encryption scheme
provably secure
public key encryption
cca secure
signature scheme
secret key
security properties
relational databases
information systems
databases
database