![Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management](https://www.pdfsearch.io/img/37a706f36c5d67bc8113132da0af6d54.jpg)
| Document Date: 2008-09-15 00:54:54 Open Document File Size: 270,90 KBShare Result on Facebook
Company params SA / G1 / KGC / G2 / / Currency pence / / / Event FDA Phase / Funding / Reorganization / / Facility University of London / / IndustryTerm secure systems / secure algorithms / polynomial-time algorithm / multiplicative / certificate management / additive / / Organization Certification Authority / NUF-NAL / Nuffield Foundation / University of London / / Person Sattam S. Al-Riyami / Kenneth G. Paterson / / Position security model for CL-PKE / This author / / Product Franklin / CL / M0 / / ProvinceOrState Pennsylvania / California / / Technology Public Key Infrastructure / randomized algorithm / identity-based public key encryption / PKI / Setup algorithm / private key / encryption / appropriately secure algorithms / Cryptography / 3 Certificateless Public Key Encryption / seven algorithms / An algorithm / PKI technology / Public Key / artificial intelligence / certificateless public key encryption / polynomial-time algorithm / seven randomized algorithms / /
SocialTag |