Login / Signup
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings.
Hiroshi Okano
Keita Emura
Takuya Ishibashi
Toshihiro Ohigashi
Tatsuya Suzuki
Published in:
CANDAR (2019)
Keyphrases
</>
encryption scheme
standard model
security analysis
public key
secret key
diffie hellman
data sharing
cca secure
ciphertext
lossless compression
proxy re encryption
identity based encryption
signcryption scheme
secret sharing scheme
security model
hash functions
provably secure
knn
wireless sensor networks