Login / Signup
Identity-Based Group Encryption Revisited.
Kanika Gupta
S. Sharmila Deva Selvi
C. Pandu Rangan
Shubham Sopan Dighe
Published in:
ICICS (2017)
Keyphrases
</>
encryption scheme
key management
ciphertext
database
relational databases
low cost
lightweight
signature scheme
public key
resource constrained
security analysis
standard model
private key
image encryption