Login / Signup

Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem.

Muthulakshmi AngamuthuAnitha Ramalingam
Published in: Int. J. Inf. Comput. Secur. (2014)
Keyphrases
  • chinese remainder theorem
  • encryption scheme
  • key management
  • ciphertext
  • secret image sharing
  • security analysis
  • standard model
  • high quality
  • computational complexity
  • public key