Login / Signup

Identity-based threshold proxy re-encryption scheme from lattices and its applications.

Liqiang WuYiliang HanXiaoyuan YangMinqing Zhang
Published in: Frontiers Inf. Technol. Electron. Eng. (2022)
Keyphrases
  • signcryption scheme
  • standard model
  • signature scheme
  • key management
  • threshold selection
  • adaptive threshold
  • bilinear pairings
  • database
  • data sets
  • neural network
  • data mining
  • relational databases
  • concept lattice