Login / Signup
Secure Outsourcing of Two Standard Identity-Based Cryptosystems.
Hamid Mala
Mohammad Reza Saeidi
Published in:
ISC Int. J. Inf. Secur. (2023)
Keyphrases
</>
key distribution
signature scheme
key management
standard model
cryptographic protocols
secret key
diffie hellman
encryption scheme
authentication protocol
public key cryptosystems
blind signature
private key
information systems
secret sharing
digital signature
elliptic curve
fault tolerant