An Efficient Identity-Based Deniable Authenticated Encryption Scheme.
Weifeng WuFagen LiPublished in: KSII Trans. Internet Inf. Syst. (2015)
Keyphrases
- encryption scheme
- authentication protocol
- security analysis
- key distribution
- public key
- authentication scheme
- secret key
- key exchange
- standard model
- hash functions
- diffie hellman
- cca secure
- security model
- data sharing
- identity based encryption
- private key
- ciphertext
- signcryption scheme
- secret sharing scheme
- key management
- signature scheme
- digital signature
- security properties
- group communication
- public key cryptography
- lossless compression
- network security
- low cost
- video sequences
- real time