Identity-Based Encryptions with Tight Security Reductions to the BDH Problem.
Mototsugu NishiokaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2008)
Keyphrases
- key management
- signcryption scheme
- encryption scheme
- identity based cryptography
- lower bound
- information security
- intrusion detection
- access control
- standard model
- authentication and key agreement
- blind signature scheme
- security threats
- key distribution
- signature scheme
- upper bound
- security issues
- security level
- network security
- worst case
- security policies
- bilinear pairings
- security requirements
- security mechanisms
- identity based encryption
- data security
- security model
- public key cryptosystem
- security management
- security systems
- cyber security
- wireless sensor networks
- identity based signature
- public key
- optimal solution
- information assurance
- public key cryptography
- security analysis
- computer security
- resource constrained