Sign in
Anonymous hierarchical identity-based encryption without key delegation in decryption.
Song Luo
Published in:
Int. J. Embed. Syst. (2015)
Keyphrases
</>
identity based encryption
encryption scheme
ciphertext
public key
standard model
private key
secure communication
cca secure
access control
security analysis
provably secure
cost effective
secret key
proxy re encryption
public key encryption
peer to peer
security model