Security Weaknesses in Two Certificateless Signcryption Schemes.
S. Sharmila Deva SelviS. Sree VivekC. Pandu RanganPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- bilinear pairings
- signcryption scheme
- signature scheme
- identity based cryptography
- identity based signature
- provably secure
- key management
- blind signature scheme
- standard model
- diffie hellman
- blind signature
- public key cryptography
- security model
- key management scheme
- designated verifier
- public key
- key distribution
- private key
- wireless sensor networks
- encryption scheme
- digital signature
- resource constrained
- public key cryptosystem
- security services
- key agreement protocol
- elliptic curve
- security protocols
- hash functions
- intrusion detection
- group communication
- secret sharing scheme
- public key infrastructure
- ad hoc networks