Login / Signup
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators.
Hongyong Jia
Yue Chen
Julong Lan
Kaixiang Huang
Jun Wang
Published in:
Int. J. Inf. Sec. (2018)
Keyphrases
</>
identity based encryption
provably secure
public key encryption
cost effective
encryption scheme
standard model
multiresolution
web pages
similarity measure
relational databases
image quality
smart card
key management