Login / Signup
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.
Yi-Fan Tseng
Chun-I Fan
Cheng-Wei Sung
Published in:
Int. J. Found. Comput. Sci. (2019)
Keyphrases
</>
identity based encryption
standard model
public key
security model
proxy re encryption
encryption scheme
ciphertext
provably secure
public key encryption
cca secure
wireless sensor networks
low cost