Login / Signup
Robust key-evolving public key encryption schemes.
Wen-Guey Tzeng
Zhi-Jia Tzeng
Published in:
IACR Cryptol. ePrint Arch. (2001)
Keyphrases
</>
public key
encryption scheme
private key
secure communication
security analysis
ciphertext
security model
public key encryption
signature scheme
digital signature
secret key
proxy re encryption
diffie hellman
standard model
public key cryptography
public key cryptosystem
authentication protocol
identity based encryption
authentication scheme
cca secure
signcryption scheme
digital images
multiresolution
blind signature scheme
provably secure
cost effective
key distribution
data sharing
high dimensional
rfid tags
lossless compression