Back to Results
First PageMeta Content
ID-based encryption / Security / Civil law / Digital signature / RSA / Group signature / Cryptography / Public-key cryptography / Cyberwarfare


Document Date: 2014-05-09 20:15:57


Open Document

File Size: 480,77 KB

Share Result on Facebook

Company

G. / G. We / GT / /

Event

FDA Phase / /

IndustryTerm

domain / normal encryption algorithm / source / real-life applications / distributed opening protocol / auction protocols / joint opening protocol / randomized algorithm / public transportation systems / anonymous subscription systems / secure solutions / trusted computing platforms / deterministic algorithm / public transportation / encryption algorithm / target / /

Organization

Diffie-Hellman / /

Person

Marc Joye Technicolor / Ci / Cj / Ohara / Libert Technicolor / /

Position

author / random oracle model / IND-ID-CPA / /

Product

D3DH / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Encryption / cryptography / public key / normal encryption algorithm / encryption algorithm / deterministic algorithm / identity-based encryption / joint opening protocol / possibly randomized algorithm / private key / secret key / distributed opening protocol / auction protocols / /

SocialTag