Star 0

Abstract

The session has two talks on attribute and identity based encryption schemes. They are public key encryption schemes that allow the control of the decryption capability, based on the receiver's…