![ID-based cryptography / Cyberwarfare / Security / Key management / Boneh/Franklin scheme / Applied mathematics / Cryptography / ID-based encryption / Public-key cryptography ID-based cryptography / Cyberwarfare / Security / Key management / Boneh/Franklin scheme / Applied mathematics / Cryptography / ID-based encryption / Public-key cryptography](https://www.pdfsearch.io/img/9644e507e96761c9c6455876bcb6f1b4.jpg)
| Document Date: 2013-06-17 13:32:36 Open Document File Size: 792,36 KBShare Result on Facebook
City Madrid / Alice Bob Identity / / Company Shamir / / Country Spain / / / Facility Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute / / IndustryTerm cryptographic systems / / Organization Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute / / Person Alice Bob / / Product Franklin / / Technology Encryption / bob@comp.com Alice Bob Identity-Based Encryption / troublesome Identity-Based Encryption / public key Identity-Based Encryption / cryptography / public key bob@comp.com Alice Bob Identity-Based Encryption / private key / public key / 10.17 Identity-Based Encryption / /
SocialTag |