I am referring to the key-recovery attack made in the article "Attribute-based encryption implies identity based encryption".

More Chetan Naik's questions See All
Similar questions and discussions