. two ID-based broadcast signcryption schemes.
Jianhong ZhangWenjing TangPublished in: Secur. Commun. Networks (2015)
Keyphrases
- bilinear pairings
- signcryption scheme
- signature scheme
- blind signature scheme
- provably secure
- key management
- identity based cryptography
- standard model
- blind signature
- key management scheme
- ring signature
- diffie hellman
- partially blind signature scheme
- public key cryptography
- electronic voting
- identity based signature
- public key
- designated verifier
- wireless sensor networks
- digital television
- secure communication
- key distribution
- security model
- elliptic curve
- ring signature scheme
- ad hoc networks