Chang, D.; Chauhan, A.K.; Kumar, S.; Sanadhya, S.K.
(2018-12-22)
In this paper, we present an identity-based encryption scheme from codes with efficient key
revocation. Recently, in Crypto 2017, Gaborit et al. proposed a first identity-based encryption scheme
from codes with rank ...