Login / Signup

Identity-based threshold ring signcryption from pairing.

Lunzhi DengSiwei LiYafeng Yu
Published in: Int. J. Electron. Secur. Digit. Forensics (2014)
Keyphrases
  • signcryption scheme
  • standard model
  • ring signature
  • signature scheme
  • bilinear pairings
  • public key
  • key management
  • key distribution
  • encryption scheme
  • identity based cryptography
  • neural network
  • private key