Provably Secure Identity-based Threshold Key Escrow from Pairing.
Yu LongZheng GongKefei ChenShengli LiuPublished in: Int. J. Netw. Secur. (2009)
Keyphrases
- provably secure
- key management
- signcryption scheme
- standard model
- signature scheme
- bilinear pairings
- public key
- blind signature scheme
- public key cryptography
- private key
- security model
- encryption scheme
- hash functions
- secure communication
- blind signature
- third party
- threshold signature scheme
- diffie hellman
- wireless sensor networks
- ad hoc networks
- high dimensional