ID-based encryption from elliptic curves over ring
ZHANG Ning1,2;XIN Xiang-jun1,3;XIAO Guo-zhen1
(1. The Ministry of Edu. Key Lab. of Computer Networks and Information Security, Xidian Univ., Xi′an 710071, China;2. State Key Lab. of Information Security, Beijing 100049, China;3. Dept. of Information and Computing Science, Zhengzhou Univ. of Light Industry, Zhengzhou 450002, China)