Login / Signup
Identity-based threshold ring signcryption from pairing.
Lunzhi Deng
Siwei Li
Yafeng Yu
Published in:
Int. J. Electron. Secur. Digit. Forensics (2014)
Keyphrases
</>
signcryption scheme
standard model
ring signature
signature scheme
bilinear pairings
public key
key management
key distribution
encryption scheme
identity based cryptography
neural network
private key