Pairing-based public-key encryption schemes with backward-and-forward security
Identity-based cryptosystems utilize some arbitrary strings as the participants' public key in the underlying system. The encryptioner will not need to obtain the decryptioner's certificate. That will simplify the certificate management. Therefore, it is still interesting to propose som...
Main Authors: | , , |
---|---|
Format: | Journal Article |
Published: |
CRL Publishers
2008
|
Subjects: | |
Online Access: | http://www.crlpublishing.co.uk/journal.asp?j=csse&s=Vol 23 2008 http://hdl.handle.net/20.500.11937/20535 |