Security analysis of an identity-based mix net.
Habib Allah YajamAli MahmoodiJavad MohajeriMahmoud SalmasizadehPublished in: ISCISC (2013)
Keyphrases
- security analysis
- encryption scheme
- public key
- signature scheme
- proxy signature scheme
- standard model
- smart card
- signcryption scheme
- high security
- security model
- secret key
- security properties
- ciphertext
- private key
- security requirements
- diffie hellman
- key exchange
- secret sharing scheme
- hash functions
- authentication protocol
- information security
- user authentication
- low cost
- key management
- cost effective
- lossless compression
- information systems