Login / Signup
Identity-Based Threshold Decryption.
Joonsang Baek
Yuliang Zheng
Published in:
IACR Cryptol. ePrint Arch. (2003)
Keyphrases
</>
encryption scheme
signcryption scheme
ciphertext
standard model
identity based encryption
key management
signature scheme
public key
secret key
database
wireless networks
roc curve
fault tolerant
security analysis
smart card
diffie hellman
website
databases