Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes.
Sumit Kumar PandeyRana BaruaPublished in: J. Internet Serv. Inf. Secur. (2011)
Keyphrases
- provably secure
- standard model
- identity based signature
- identity based encryption
- signature scheme
- bilinear pairings
- key management
- public key
- signcryption scheme
- security model
- identity based cryptography
- proxy re encryption
- ring signature
- diffie hellman
- blind signature
- blind signature scheme
- public key cryptography
- ciphertext
- encryption scheme
- ad hoc networks
- private key
- hash functions
- cca secure
- digital signature
- resource constrained
- security requirements