-
1
Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free
Published 2024-01-01Subjects: Get full text
Article -
2
Identity authentication scheme based on identity-based encryption
Published 2016-06-01Subjects: Get full text
Article -
3
Identity authentication scheme based on identity-based encryption
Published 2016-06-01Subjects: Get full text
Article -
4
Provably secure partially blind signature without trusted PKG
Published 2010-01-01Subjects: Get full text
Article -
5
Provably secure partially blind signature without trusted PKG
Published 2010-01-01Subjects: “…ID-based signature;key escrow;bilinear pairing;partially blind signature…”
Get full text
Article -
6
Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain
Published 2020-01-01Subjects: Get full text
Article -
7
Secure key-sharing algorithm based on smart grid
Published 2021-08-01Subjects: Get full text
Article -
8
Secure key-sharing algorithm based on smart grid
Published 2021-08-01Subjects: Get full text
Article -
9
A privacy-preserving data aggregation system based on blockchain in VANET
Published 2024-09-01Subjects: Get full text
Article -
10
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography
Published 2019-01-01Subjects: Get full text
Article -
11
Escrow mechanism for personal security keys on IBE
Published 2009-01-01Subjects: “…key escrow…”
Get full text
Article -
12
Escrow mechanism for personal security keys on IBE
Published 2009-01-01Subjects: “…key escrow;IBE;identity-based encryption;personal security key;key recovery;key renewal…”
Get full text
Article -
13
Efficient ID-based certificateless signature scheme
Published 2008-01-01Subjects: Get full text
Article -
14
Efficient ID-based certificateless signature scheme
Published 2008-01-01Subjects: “…ID-based signature;certificateless signature;bilinear pairing;key escrow;gap diffie-hellman group…”
Get full text
Article -
15
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: “…identity-based cryptography;traceable identity-based signature;elliptic curve discrete logarithm problem;key escrow…”
Get full text
Article -
16
Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem
Published 2021-02-01Subjects: “…key escrow problem…”
Get full text
Article -
17
Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network
Published 2024-01-01Subjects: Get full text
Article -
18
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: Get full text
Article