Login / Signup
On the Power of Hierarchical Identity-Based Encryption.
Mohammad Mahmoody
Ameer Mohammed
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
identity based encryption
standard model
public key
security model
encryption scheme
ciphertext
proxy re encryption
provably secure
power consumption
public key encryption
low cost
relational databases
security analysis
secret key
end to end
bit rate
image compression
video sequences