Login / Signup
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Kenneth G. Paterson
Sriramkrishnan Srinivasan
Published in:
Pairing (2008)
Keyphrases
</>
network connection
ring signature scheme
information security
security model
security properties
identity based encryption
information systems
intrusion detection
network security
public key
encryption scheme
trusted computing
lightweight
security requirements
public key encryption