On the Security of an Identity-Based Threshold Proxy Signature Scheme with Known Signers.
Rongbo LuDake HeChangji WangPublished in: ICNC (3) (2007)
Keyphrases
- signcryption scheme
- proxy signature scheme
- designated verifier
- bilinear pairings
- standard model
- proxy signature
- forward secure
- key management
- security analysis
- public key
- key distribution
- signature scheme
- private key
- encryption scheme
- security model
- security requirements
- network security
- resource constrained
- wireless sensor networks
- cryptographic protocols
- information security
- access control
- sensor networks