Identity-Based Authenticated Encryption with Identity Confidentiality.
Yunlei ZhaoPublished in: ESORICS (2) (2020)
Keyphrases
- key distribution
- key management
- key exchange
- encryption scheme
- secret key
- ciphertext
- diffie hellman
- security properties
- data confidentiality
- authentication scheme
- private key
- signature scheme
- authentication and key agreement
- standard model
- security analysis
- digital signature
- security protocols
- public key cryptography
- public key
- bilinear pairings
- session key
- access control
- resource constrained
- signcryption scheme
- wireless sensor networks
- key agreement protocol
- key exchange protocol
- provably secure
- identity based encryption
- group communication
- secure communication
- secret sharing scheme
- identity management
- ad hoc networks
- proxy re encryption
- data quality
- authentication protocol
- smart card
- elliptic curve
- fault tolerant
- data sharing
- information security
- data access
- hash functions
- data security
- password based authenticated key exchange