Login / Signup
Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority.
Jui-Di Wu
Yuh-Min Tseng
Sen-Shan Huang
Tung-Tso Tsai
Published in:
Informatica (2020)
Keyphrases
</>
identity based signature
identity based cryptography
standard model
key management
signature scheme
security model
cloud computing
access control
blind signature
public key
key distribution
public key cryptography
database systems
cost effective
third party
provably secure