Disaster-tolerant authentication system for NDN using Hierarchical ID-Based Encryption.
Takeo OgawaraYoshihiro KawaharaTohru AsamiPublished in: ICNP (2013)
Keyphrases
- public key
- encryption scheme
- security analysis
- public key cryptography
- identity authentication
- encryption decryption
- image authentication
- data encryption
- key distribution
- private key
- key agreement
- key management
- secret key
- digital signature
- security properties
- integrity verification
- elliptic curve cryptography
- decision support system
- diffie hellman
- provably secure
- blind signature
- virtual private network
- partially blind signature scheme
- biometric authentication
- signature scheme
- digital watermarking
- security model
- elliptic curve
- key exchange
- image encryption
- authentication scheme
- user authentication
- mutual authentication
- public key infrastructure
- hierarchical structure
- security requirements
- encryption algorithms
- bilinear pairings
- authentication protocol
- secure communication
- encryption algorithm
- blind signature scheme
- high security