Return to Article Details Application of Bounded Collusion for Identity-Based Encryption Using the Identity Based Encryption Algorithm Download Download PDF