Login / Signup

Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity.

Yinghui ZhangMenglei YangDong ZhengTiantian ZhangRui GuoFang Ren
Published in: Int. J. Found. Comput. Sci. (2019)
Keyphrases
  • identity based encryption
  • standard model
  • public key
  • provably secure
  • security model
  • encryption scheme
  • ciphertext
  • proxy re encryption
  • cca secure
  • email
  • public key encryption
  • secret key