Date: 2015-11-23 04:37:54Cryptography Public-key cryptography Zero-knowledge proof ID-based encryption Cryptographic protocol ID-based cryptography Authentication Digital signature FeigeFiatShamir identification scheme | | Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations Cryptography: the art and science of concealingAdd to Reading ListSource URL: security-lab.jaist.ac.jpDownload Document from Source Website File Size: 453,28 KBShare Document on Facebook
|