会议专题

Anonymous Identity-based Encryption

Analysing some typical identity-based.Encryption schemes,we get that most of them are not anonymous.In this paper,we present a method to add the anonymity property to those schemes that are not anonymous.

Anonymity Property Identity-Based Encryption

Zhang Xinfang Xu Qiuliang

Dept.Computer science and technology of Shandong University,Jinan,250101,China

国内会议

中国通信学会第五届学术年会

南京

英文

342-347

2008-02-01(万方平台首次上网日期,不代表论文的发表时间)