International Journal of Electronics and Telecommunications > 2022 > Vol. 68. No. 3 > 469--473
Source
Abstract
Identifiers
journal e-ISSN : | 2300-1933 |
DOI | 10.24425/ijet.2022.141262 |
Authors
Keywords
Additional information
Publisher
Fields of science
Bibliography
-
[1] C. Gentry, “Practical identity-based encryption without random oracles,” in Advances in Cryptology-EUROCRYPT, ed: Springer 445-464, 2006. https://doi.org/10.1007/11761679_27
-
[2] M. Green, and S. H. Berger, “Blind Identity based encryption and simulatable oblivious transfer,” Cryptography eprint Archive, Report 2007/235, 2007, available at https://eprint.iacr.org/2007/235
-
[3] S. K. H. Islam, “Identity-based encryption and digital signature scheme using extended chaotic maps”, IACR Cryptology ePrint Archive, Volume 2014/275, 2014