Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Identity-Based Encryption Protocols Using Bilinear Pairing
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
obtain an MR-IBE protocol which is secure in the sID model without random oracles. The<br />
only previous construction of MR-IBE is secure in the sID model using random oracle.<br />
93