Content
Frontiers of Information Technology & Electronic Engineering >> 2022, Volume 23, Issue 2 doi: 10.1631/FITEE.2000366
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Affiliation(s): Key Laboratory of Network and Information Security, Engineering University of People's Armed Police, Xi'an 710086, China; MOE Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China; less
Abstract
Keywords
Post-quantum cryptography ; Threshold proxy re-encryption ; Lattices ; Robustness ; Decentralization
Content