A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Wei WuYi MuWilly SusiloXinyi HuangLi XuPublished in: Comput. J. (2012)
Keyphrases
- provably secure
- public key cryptography
- identity based encryption
- key management
- public key infrastructure
- encryption scheme
- public key
- standard model
- digital signature
- signature scheme
- blind signature
- security model
- ciphertext
- blind signature scheme
- secret key
- bilinear pairings
- wireless sensor networks
- diffie hellman
- elliptic curve
- diffie hellman assumption
- resource constrained
- hash functions
- key distribution
- security services
- secure communication
- ad hoc networks
- security protocols
- secret sharing scheme
- security analysis
- data sharing
- response time
- similarity measure
- partially blind signature scheme