Login / Signup
Revocable hierarchical identity-based encryption via history-free approach.
Jae Hong Seo
Keita Emura
Published in:
Theor. Comput. Sci. (2016)
Keyphrases
</>
identity based encryption
standard model
public key
proxy re encryption
security model
ciphertext
provably secure
encryption scheme
cca secure
secret key
public key encryption
databases
information retrieval
signature scheme