Login / Signup
Provably secure identity-based authenticated key agreement protocol and its application.
Shuai Shao
Bin Tian
Xin Wang
Yang Li
Published in:
CCIS (2012)
Keyphrases
</>
provably secure
key agreement protocol
key management
signature scheme
standard model
diffie hellman assumption
bilinear pairings
security model
public key
diffie hellman
blind signature scheme
blind signature
hash functions
key distribution
public key cryptography
encryption scheme
ad hoc networks
signcryption scheme
wireless sensor networks
resource constrained
threshold signature scheme
access control
group communication
security properties
security analysis