Sign in
Generalized (identity-based) hash proof system and its applications.
Yu Chen
Zongyang Zhang
Dongdai Lin
Zhenfu Cao
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
b tree
data structure
hash functions
knowledge base
key management
key distribution
identity based cryptography