Decryption. After receiving a ciphertext (c1, c2, c3), anyone with a valid message-signature pair (s, σ) can extract =
Appears in 1 contract
Sources: Group Key Agreement Protocol
Decryption. After receiving a ciphertext (c1, c2, c3), anyone with who has a valid message-signature pair (s, ,σ) can extract =m = c3 / e(σ,c1)e(H(s), c2).
Appears in 1 contract
Sources: Dissertation