Login / Signup
Revocable Identity-Based Encryption Revisited: Security Model and Construction.
Jae Hong Seo
Keita Emura
Published in:
Public Key Cryptography (2013)
Keyphrases
</>
security model
identity based encryption
proxy re encryption
public key
provably secure
access control
security analysis
security requirements
designated verifier
encryption scheme
information systems
smart card
standard model
ciphertext