Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
Yuu Ishida; Junji Shikata; Yohei Watanabe
International Journal of Applied Cryptography (IJACT), 2017 Vol.3 No.3, pp.288 - 311
8 - 14 =

Thank you for your feedback.