How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.
Yitao DuanJohn F. CannyPublished in: CT-RSA (2006)
Keyphrases
- provably secure
- standard model
- secret key
- encryption scheme
- signature scheme
- ciphertext
- public key
- key management
- diffie hellman
- blind signature
- security model
- hash functions
- security analysis
- cryptographic protocols
- private key
- smart card
- blind signature scheme
- public key cryptography
- cca secure
- forward secure
- bilinear pairings
- digital signature
- secure communication
- wireless networks
- key distribution
- high dimensional
- wireless ad hoc networks
- authentication protocol
- group communication
- secret sharing scheme
- elliptic curve
- wireless sensor networks