Return to Article Details A new public key encryption scheme based on two cryptographic assumptions Download Download PDF