Login / Signup
Security analysis of an identity-based mix net.
Habib Allah Yajam
Ali Mahmoodi
Javad Mohajeri
Mahmoud Salmasizadeh
Published in:
ISCISC (2013)
Keyphrases
</>
security analysis
encryption scheme
public key
signature scheme
proxy signature scheme
standard model
smart card
signcryption scheme
high security
security model
secret key
security properties
ciphertext
private key
security requirements
diffie hellman
key exchange
secret sharing scheme
hash functions
authentication protocol
information security
user authentication
low cost
key management
cost effective
lossless compression
information systems