Amanote Research

Amanote Research

    RegisterSign In

Short Hierarchical Identity-Based Encryption in the Selective-Id Model

Journal of Software
doi 10.4304/jsw.8.7.1613-1619
Full Text
Open PDF
Abstract

Available in full text

Date

July 1, 2013

Authors
Xiaoming HuHuajie XuJian WangYinchun YangXiaolin Xu
Publisher

International Academy Publishing (IAP)


Related search

Revocable Hierarchical Identity-Based Broadcast Encryption

Tsinghua Science and Technology
Multidisciplinary
2018English

Identity Based Group Signatures From Hierarchical Identity-Based Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

English

Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure

Symmetry
MathematicsChemistryPhysicsComputer ScienceAstronomy
2019English

Identity-Based Encryption

English

A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks

2008English

Identity-Based Encryption From the Weil Pairing

SIAM Journal on Computing
MathematicsComputer Science
2003English

Bootstrappable Identity-Based Fully Homomorphic Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Improved Identity-Based Online/Offline Encryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy