Login / Signup
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme.
S. Sharmila Deva Selvi
S. Sree Vivek
Neha Jain
C. Pandu Rangan
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
signcryption scheme
standard model
signature scheme
public key
bilinear pairings
secret key
key management
designated verifier
key distribution
private key
blind signature scheme
identity based cryptography
secret sharing scheme
provably secure
encryption scheme
diffie hellman
wireless sensor networks
hash functions
low cost