Efficient and Provably Secure Multi-receiver Identity-Based Signcryption.
Shanshan DuanZhenfu CaoPublished in: ACISP (2006)
Keyphrases
- provably secure
- key management
- bilinear pairings
- standard model
- identity based encryption
- security model
- signcryption scheme
- signature scheme
- public key
- blind signature
- resource constrained
- blind signature scheme
- public key cryptography
- wireless sensor networks
- identity based cryptography
- ad hoc networks
- hash functions
- digital signature
- key distribution
- diffie hellman
- encryption scheme
- secret key
- secret sharing scheme
- group communication
- elliptic curve
- proxy re encryption
- partially blind signature scheme
- security services
- security analysis
- cost effective
- data distribution
- low cost