Cryptanalysis of Two Identity Based Signcryption Schemes.
Qi XiaChunxiang XuPublished in: DASC (2009)
Keyphrases
- signature scheme
- identity based signature
- bilinear pairings
- standard model
- signcryption scheme
- key management
- key management scheme
- secret key
- public key
- provably secure
- identity based cryptography
- diffie hellman
- ring signature
- blind signature scheme
- digital signature
- blind signature
- key distribution
- security model
- wireless sensor networks
- response time
- similarity measure
- real time
- access control
- image compression
- query processing
- data sets