Identity Based Online/Offline Encryption and Signcryption Schemes Revisited.
S. Sharmila Deva SelviS. Sree VivekC. Pandu RanganPublished in: InfoSecHiComNet (2011)
Keyphrases
- key management
- key management scheme
- bilinear pairings
- identity based signature
- standard model
- encryption scheme
- signcryption scheme
- signature scheme
- provably secure
- public key cryptography
- ciphertext
- identity based cryptography
- digital signature
- resource constrained
- ad hoc networks
- public key
- wireless sensor networks
- security model
- secret key
- key distribution
- diffie hellman
- security analysis
- real time
- online learning
- blind signature
- secret sharing scheme
- elliptic curve
- key exchange
- identity based encryption
- image compression
- private key
- blind signature scheme
- group communication
- security properties
- security protocols
- compression ratio
- end to end
- peer to peer
- search engine