Login / Signup

Fully, (Almost) Tightly Secure IBE and Dual System Groups.

Jie ChenHoeteck Wee
Published in: CRYPTO (2) (2013)
Keyphrases
  • encryption scheme
  • public key encryption
  • authentication scheme
  • data mining
  • information systems
  • public key
  • security mechanisms
  • key management
  • cca secure