Login / Signup

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators.

Hongyong JiaYue ChenJulong LanKaixiang HuangJun Wang
Published in: Int. J. Inf. Sec. (2018)
Keyphrases