Amanote Research

Amanote Research

    RegisterSign In

Identity-Based Encryption

doi 10.1007/springerreference_296
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors

Unknown

Publisher

Springer-Verlag


Related search

Identity Based Group Signatures From Hierarchical Identity-Based Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Revocable Hierarchical Identity-Based Broadcast Encryption

Tsinghua Science and Technology
Multidisciplinary
2018English

Bootstrappable Identity-Based Fully Homomorphic Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Improved Identity-Based Online/Offline Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Identity-Based Encryption With Efficient Revocation

2008English

Identity Based Encryption and Identity Based Signature Scheme on Security Schemes

International Journal of Innovative Technology and Exploring Engineering
Mechanics of MaterialsElectronic EngineeringCivilStructural EngineeringElectricalComputer Science
2019English

New Anonymity Notions for Identity-Based Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Breaking an Identity-Based Encryption Scheme Based on DHIES

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Identity-Based Encryption From the Weil Pairing

SIAM Journal on Computing
MathematicsComputer Science
2003English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy