Login / Signup
Outsourced revocable identity-based encryption from lattices.
Chengcheng Dong
Kang Yang
Jian Qiu
Yuanfang Chen
Published in:
Trans. Emerg. Telecommun. Technol. (2019)
Keyphrases
</>
identity based encryption
standard model
public key
provably secure
third party
security model
public key encryption
proxy re encryption
ciphertext
encryption scheme
cca secure
public key cryptosystem
keyword search