![Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext](https://www.pdfsearch.io/img/625a1e83095c6b3be67d0fbbbf09bf5a.jpg) Date: 2007-11-26 10:35:37Cryptography Identity-based cryptography Public-key cryptography Elliptic curve cryptography Pairing-based cryptography Ciphertext indistinguishability Chosen-ciphertext attack ID-based encryption Advantage Encryption BonehFranklin scheme Ciphertext | | Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands. Add to Reading ListSource URL: www.dgalindo.esDownload Document from Source Website File Size: 239,76 KBShare Document on Facebook
|