10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Applied Cryptography and Network Security 

      Identity-Based Extractable Hash Proofs and Their Applications

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references19

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Identity-Based Cryptosystems and Signature Schemes

          Adi Shamir (1985)
            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Efficient Identity-Based Encryption Without Random Oracles

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              An Identity Based Encryption Scheme Based on Quadratic Residues

                Bookmark

                Author and book information

                Book Chapter
                2012
                : 153-170
                10.1007/978-3-642-31284-7_10
                997f7b66-fec2-4761-af12-5bf2caa8c347

                http://www.springer.com/tdm

                History

                Comments

                Comment on this book

                Book chapters

                Similar content4,824