Login / Signup
Compact hierarchical identity-based encryption based on a harder decisional problem.
David Galindo
Published in:
Int. J. Comput. Math. (2015)
Keyphrases
</>
identity based encryption
standard model
public key
security model
provably secure
ciphertext
encryption scheme
proxy re encryption
cca secure
public key encryption
structured data
power consumption
signature scheme
secret key
security analysis