<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cryptographic software / Public key infrastructure / ID-based encryption / Encryption / Key / Identity-based conditional proxy re-encryption / Deniable encryption
Date: 2018-04-24 17:18:08
Cryptography
Public-key cryptography
Identity-based cryptography
Attribute-based encryption
Cryptographic software
Public key infrastructure
ID-based encryption
Encryption
Key
Identity-based conditional proxy re-encryption
Deniable encryption

April 17, 2018 An Introduction to Attribute-Based Encryption Attribute Based Encryption Encryption is a method of encoding data that protects the confidentiality of its contents from unauthorized attackers. Traditionall

Add to Reading List

Source URL: www.zeutro.com

Download Document from Source Website

File Size: 194,09 KB

Share Document on Facebook

Similar Documents

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qQ53 - View Document

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qey3 - View Document

2015 IEEE Symposium on Security and Privacy  Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

DocID: 1pq6g - View Document

Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

DocID: 1mtvE - View Document