A Computational Review of Identity-based Signcryption Schemes.
Murari MandalGaurav SharmaAnil K. VermaPublished in: Int. J. Netw. Secur. (2016)
Keyphrases
- bilinear pairings
- signcryption scheme
- key management
- identity based signature
- standard model
- key management scheme
- signature scheme
- identity based cryptography
- provably secure
- blind signature scheme
- security model
- public key
- public key cryptography
- data sets
- ad hoc networks
- diffie hellman
- resource constrained
- blind signature
- private key
- security properties
- ciphertext
- terms of computational efficiency
- mathematical programming