Provably Secure Identity-Based Encryption Resilient to Post-Challenge Continuous Auxiliary Input Leakage

Security and Communication Networks - Egypt
doi 10.1002/sec.1396
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Wiley