Login / Signup

Constant Size Hierarchical Identity-Based Encryption Tightly Secure in the Full Model without Random Oracles.

Yijun MaoXi ZhangMin-Rong ChenYiju Zhan
Published in: EIDWT (2013)
Keyphrases
  • distributed systems
  • security model
  • relational databases