Certificate-based encryption
Advantage
Cipher
RSA
ID-based encryption
Chosen-ciphertext attack
Cryptography
Public-key cryptography
Electronic commerce