Login / Signup

How to construct identity-based signatures without the key escrow problem.

Tsz Hon YuenWilly SusiloYi Mu
Published in: Int. J. Inf. Sec. (2010)
Keyphrases
  • signature scheme
  • machine learning
  • third party
  • key management
  • data sets
  • databases
  • database systems
  • bayesian networks
  • standard model
  • diffie hellman