Login / Signup
Leakage-resilient identity-based cryptography from minimal assumptions.
Yanwei Zhou
Bo Yang
Zirui Qiao
Zhe Xia
Mingwu Zhang
Yi Mu
Published in:
Des. Codes Cryptogr. (2023)
Keyphrases
</>
identity based cryptography
key management
ad hoc networks
digital signature
bilinear pairings