Provable Secure Generalized Signcryption.
Xu An WangXiaoyuan YangYiliang HanPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- key management
- key management scheme
- standard model
- security properties
- identity based signature
- trusted third party
- wireless sensor networks
- authentication scheme
- signcryption scheme
- encryption scheme
- resource constrained
- security requirements
- security issues
- authentication protocol
- security model
- digital signature
- key distribution
- group communication
- diffie hellman
- covert channel
- information systems