![Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme](https://www.pdfsearch.io/img/b65f2d3d9110ca504d99c9fed894d587.jpg) Date: 2015-11-23 04:37:54Cryptography Public-key cryptography Zero-knowledge proof ID-based encryption Cryptographic protocol ID-based cryptography Authentication Digital signature FeigeFiatShamir identification scheme | | Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations Cryptography: the art and science of concealingAdd to Reading ListSource URL: security-lab.jaist.ac.jpDownload Document from Source Website File Size: 453,28 KBShare Document on Facebook
|