Identity-Based Threshold Decryption Revisited.
Shengli LiuKefei ChenWeidong QiuPublished in: ISPEC (2007)
Keyphrases
- encryption scheme
- signcryption scheme
- ciphertext
- standard model
- signature scheme
- public key
- secret key
- security analysis
- threshold selection
- key management
- group testing
- secure communication
- proxy re encryption
- neural network
- encryption algorithm
- key distribution
- similarity search
- relational databases
- genetic algorithm