Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes.
Kyungah ShimYoung-Ran LeePublished in: Fundam. Informaticae (2011)
Keyphrases
- signature scheme
- identity based signature
- bilinear pairings
- blind signature scheme
- threshold signature scheme
- identity based cryptography
- provably secure
- blind signature
- standard model
- signcryption scheme
- key management
- public key
- digital signature
- diffie hellman
- designated verifier
- private key
- public key cryptosystem
- security model
- ring signature
- forward secure
- public key cryptography
- key management scheme
- electronic voting
- wireless sensor networks
- key distribution
- secret key
- key agreement protocol
- hash functions
- resource constrained
- security policies