Back to Results
First PageMeta Content
Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme


Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing
Add to Reading List

Document Date: 2015-11-23 04:37:54


Open Document

File Size: 453,28 KB

Share Result on Facebook