Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.
Pairat ThorncharoensriWilly SusiloYi MuPublished in: WISA (2009)
Keyphrases
- chosen plaintext
- identity based signature
- standard model
- signature scheme
- provably secure
- cca secure
- encryption scheme
- diffie hellman
- key distribution
- key management
- identity based encryption
- ciphertext
- cryptographic protocols
- signcryption scheme
- blind signature
- stream cipher
- bilinear pairings
- threshold signature scheme
- proxy re encryption
- identity based cryptography
- public key encryption
- public key
- secret key
- secure communication
- security model