Login / Signup

Identity-Based Encryption Comes of Age.

Luther Martin
Published in: Computer (2008)
Keyphrases
  • identity based encryption
  • standard model
  • public key
  • proxy re encryption
  • public key encryption
  • encryption scheme
  • security model
  • web pages
  • data streams
  • keyword search
  • security analysis
  • ciphertext
  • provably secure