ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System.
Yuh-Min TsengJinn-ke JanPublished in: ACSAC (1998)
Keyphrases
- key distribution
- key management
- key management scheme
- provably secure
- bilinear pairings
- security protocols
- key agreement
- ad hoc networks
- group communication
- signcryption scheme
- wireless sensor networks
- authentication protocol
- smart card
- secret key
- resource constrained
- digital signature
- security properties
- secure communication
- fault tolerant
- secret sharing scheme
- private key
- security services
- public key cryptography
- signature scheme
- wireless ad hoc networks
- elliptic curve
- encryption scheme
- diffie hellman
- network security
- distributed systems