<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme
Date: 2015-11-23 04:37:54
Cryptography
Public-key cryptography
Zero-knowledge proof
ID-based encryption
Cryptographic protocol
ID-based cryptography
Authentication
Digital signature
FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Download Document from Source Website

File Size: 453,28 KB

Share Document on Facebook

Similar Documents

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

DocID: 1qZ4T - View Document

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1qz9f - View Document

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1pdGI - View Document