Identity-based trapdoor mercurial commitments and applications.
Xiaofeng ChenWilly SusiloFangguo ZhangHaibo TianJin LiPublished in: Theor. Comput. Sci. (2011)
Keyphrases
- ciphertext
- standard model
- encryption scheme
- signature scheme
- identity based encryption
- secret key
- multiagent systems
- public key
- proxy re encryption
- signcryption scheme
- authentication and key agreement
- key management
- cca secure
- multiresolution
- key distribution
- data sets
- data model
- data streams
- reinforcement learning
- security analysis
- image sequences
- security model
- database systems
- private key
- data mining
- databases
- real time