<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme
Date: 2015-11-23 04:37:54
Cryptography
Public-key cryptography
Zero-knowledge proof
ID-based encryption
Cryptographic protocol
ID-based cryptography
Authentication
Digital signature
FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Download Document from Source Website

File Size: 453,28 KB

Share Document on Facebook

Similar Documents