Login / Signup
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Priyanka Dutta
Mei Jiang
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
Published in:
AsiaCCS (2022)
Keyphrases
</>
encryption scheme
key management
encryption algorithms
bi directional
security properties
high security
network connection
intrusion detection
information security
security requirements
security protocols
standard model
key exchange
signcryption scheme
identity based cryptography