Login / Signup
A Proxy Re-Encryption Scheme Based on Elliptic Curve Group.
Hang Li
Shoulin Yin
Chu Zhao
Lin Teng
Published in:
J. Inf. Hiding Multim. Signal Process. (2017)
Keyphrases
</>
elliptic curve
scalar multiplication
efficient computation
digital signature
key management
java card
diffie hellman
modular exponentiation
elliptic curve cryptography