Login / Signup
Fully, (Almost) Tightly Secure IBE and Dual System Groups.
Jie Chen
Hoeteck Wee
Published in:
CRYPTO (2) (2013)
Keyphrases
</>
encryption scheme
public key encryption
authentication scheme
data mining
information systems
public key
security mechanisms
key management
cca secure