Provable Secure Identity Based Generalized Signcryption Scheme
Gang YuXiaoxiao MaYong ShenWenbao HanPublished in: CoRR (2010)
Keyphrases
- signcryption scheme
- standard model
- key management
- key distribution
- private key
- bilinear pairings
- encryption scheme
- designated verifier
- diffie hellman
- public key
- signature scheme
- fault tolerant
- identity based cryptography
- ad hoc networks
- cryptographic protocols
- resource constrained
- group communication
- secret key
- low cost
- security protocols
- security analysis
- wireless sensor networks
- public key cryptography
- authentication protocol
- secret sharing scheme
- security services
- ciphertext