Login / Signup
Building Secure Public Key Encryption Scheme from Hidden Field Equations.
Yuan Ping
Baocang Wang
Yuehua Yang
Shengli Tian
Published in:
Secur. Commun. Networks (2017)
Keyphrases
</>
public key encryption scheme
public key
forward secure
standard model
encryption scheme
cca secure
security analysis
blind signature scheme
secret key
blind signature
chosen ciphertext
signature scheme
database systems
security model
public key cryptography
security issues
image compression