Sign in

Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation.

Quanyun WeiFang QiZhe Tang
Published in: Telecommun. Syst. (2018)
Keyphrases
  • databases
  • image compression
  • database
  • low cost
  • proxy re encryption
  • identity based encryption