IKE authentication using certificateless signature.
Asrul H. YaacobNazrul Muhaimin AhmadRidza FauziM. Shahir A. Majed ShikhPublished in: ICOIN (2011)
Keyphrases
- signature scheme
- public key cryptography
- key distribution
- private key
- public key
- digital signature
- security analysis
- standard model
- blind signature
- threshold signature scheme
- authentication and key agreement
- provably secure
- authentication scheme
- designated verifier
- authentication protocol
- signature verification
- public key cryptosystem
- blind signature scheme
- secret key
- bilinear pairings
- secure communication
- security model
- smart card
- diffie hellman
- elliptic curve
- public key infrastructure
- biometric authentication
- key management
- security mechanisms
- trusted third party
- signcryption scheme
- modular exponentiation
- access control