On the Security of Wang's Provably Secure Identity-based Key Agreement Protocol.
Maurizio Adriano StrangioPublished in: CoRR (2013)
Keyphrases
- provably secure
- key agreement protocol
- key management
- signature scheme
- security model
- bilinear pairings
- standard model
- diffie hellman assumption
- public key
- diffie hellman
- blind signature scheme
- hash functions
- blind signature
- encryption scheme
- public key cryptography
- access control
- security analysis
- ad hoc networks
- key distribution
- digital signature
- resource constrained
- signcryption scheme
- secret sharing scheme
- lightweight
- public key cryptosystem
- wireless sensor networks