![Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management](https://www.pdfsearch.io/img/37a706f36c5d67bc8113132da0af6d54.jpg) Date: 2008-09-15 00:54:54Electronic commerce Ciphertext indistinguishability RSA Semantic security Cipher ID-based cryptography Key Public key infrastructure Symmetric-key algorithm Cryptography Public-key cryptography Key management | | Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]Add to Reading ListSource URL: www.iacr.orgDownload Document from Source Website File Size: 270,90 KBShare Document on Facebook
|