Login / Signup

Identity-based encryption resilient to continuous key leakage.

Yanwei ZhouBo YangYi MuTao WangXin Wang
Published in: IET Inf. Secur. (2019)
Keyphrases
  • database
  • access control
  • public key