Sign in

Efficient Leakage-Resilient Identity-Based Encryption with CCA Security.

Shifeng SunDawu GuShengli Liu
Published in: Pairing (2013)
Keyphrases
  • provably secure
  • identity based encryption
  • public key
  • encryption scheme
  • standard model
  • sensor networks
  • e government
  • structured data
  • network security
  • cca secure