Login / Signup
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Chengyu Hu
Pengtao Liu
Shanqing Guo
Qiuliang Xu
Published in:
Int. J. High Perform. Comput. Netw. (2017)
Keyphrases
</>
identity based encryption
standard model
public key
security model
ciphertext
encryption scheme
proxy re encryption
multiresolution
access control
secret key
key management
provably secure
cca secure