Provably secure identity-based authenticated key agreement protocol and its application.
Shuai ShaoBin TianXin WangYang LiPublished in: CCIS (2012)
Keyphrases
- provably secure
- key agreement protocol
- key management
- signature scheme
- standard model
- diffie hellman assumption
- bilinear pairings
- security model
- public key
- diffie hellman
- blind signature scheme
- blind signature
- hash functions
- key distribution
- public key cryptography
- encryption scheme
- ad hoc networks
- signcryption scheme
- wireless sensor networks
- resource constrained
- threshold signature scheme
- access control
- group communication
- security properties
- security analysis