Sign in
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation.
Quanyun Wei
Fang Qi
Zhe Tang
Published in:
Telecommun. Syst. (2018)
Keyphrases
</>
databases
image compression
database
low cost
proxy re encryption
identity based encryption