All Stories

  1. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks