Login / Signup

Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.

Jiguo LiYuyan GuoQihong YuYang LuYichen Zhang
Published in: Secur. Commun. Networks (2016)
Keyphrases