Sciweavers

11 search results - page 3 / 3
» How to Construct Multicast Cryptosystems Provably Secure Aga...
Sort
View
ASIACRYPT
2005
Springer
13 years 10 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...