Identity-Based Cryptosystems and Quadratic Residuosity.
Marc JoyePublished in: Public Key Cryptography (1) (2016)
Keyphrases
- signature scheme
- key distribution
- public key
- standard model
- secret key
- key management
- bilinear pairings
- pairwise
- elliptic curve
- objective function
- signcryption scheme
- computational complexity
- provably secure
- private key
- digital signature
- real time
- ciphertext
- authentication and key agreement
- case study
- neural network
- cryptographic protocols
- fault tolerant
- diffie hellman
- image compression
- blind signature scheme
- similarity measure
- spline interpolation