Login / Signup
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
Jae Hong Seo
Keita Emura
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
access control
provably secure
cost effective
end to end
efficient computation
public key
key management