Login / Signup
ID-based cryptography using symmetric primitives.
Chris J. Mitchell
Fred Piper
Peter R. Wild
Published in:
Des. Codes Cryptogr. (2007)
Keyphrases
</>
cellular automata
partially blind signature scheme
low level
public key
blind signature scheme
information security
public key cryptography
signature scheme
data sets
information systems
blind signature
ring signature scheme
databases
building blocks
distributed systems
key distribution
multiscale