Identity-Based Threshold Decryption.
Joonsang BaekYuliang ZhengPublished in: Public Key Cryptography (2004)
Keyphrases
- encryption scheme
- signcryption scheme
- ciphertext
- standard model
- public key
- key management
- secure communication
- real time
- security analysis
- secret key
- bilinear pairings
- signature scheme
- secret sharing scheme
- threshold selection
- adaptive threshold
- thresholding algorithm
- proxy re encryption
- group testing
- digital signature
- diffie hellman
- thresholding method
- encryption algorithm
- data sharing
- end to end
- web services
- neural network
- databases