Login / Signup

A More Natural Way to Construct Identity-Based Identification Schemes.

Guomin YangJing ChenDuncan S. WongXiaotie DengDongsheng Wang
Published in: ACNS (2007)
Keyphrases
  • standard model
  • identity based signature
  • signature scheme
  • key management
  • data sets
  • real world
  • man made
  • encryption scheme
  • bilinear pairings
  • real time
  • databases
  • knowledge base
  • image sequences
  • key distribution