News
However, Shamir did not succeed in constructing an identity-based cryptosystem, but only in constructing an identity-based signature scheme. The authors here propose three identity-based cryptographic ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results