On the Security of Identity Based Ring Signcryption Schemes.
S. Sharmila Deva SelviS. Sree VivekC. Pandu RanganPublished in: ISC (2009)
Keyphrases
- identity based signature
- standard model
- signcryption scheme
- bilinear pairings
- key management
- identity based cryptography
- signature scheme
- key management scheme
- ring signature
- provably secure
- security model
- designated verifier
- ring signature scheme
- blind signature scheme
- encryption scheme
- key distribution
- blind signature
- diffie hellman
- public key
- digital signature
- security protocols
- public key cryptosystem
- public key cryptography
- wireless sensor networks
- private key
- electronic voting
- resource constrained
- cryptographic protocols
- secret sharing scheme
- proxy re encryption
- cca secure
- security requirements
- access control