First Page | Document Content | |
---|---|---|
![]() Date: 2003-09-02 18:40:07Electronic commerce ID-based encryption Chosen-ciphertext attack Certificate-based encryption Cipher Boneh/Franklin scheme Public key certificate Certificate authority RSA Cryptography Public-key cryptography Key management | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 251,78 KBShare Document on Facebook |
![]() | ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.orgDocID: 1kwGr - View Document |
![]() | This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followiDocID: 19fDT - View Document |
![]() | An Improved ID-based Authenticated Group Key Agreement SchemesDocID: 13lXc - View Document |
![]() | Lecture Notes in Computer Science:DocID: 12OA3 - View Document |
![]() | Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.docDocID: 11RlP - View Document |