PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.
S. Sree VivekS. Sharmila Deva SelviSalini Selvaraj KowsalyaC. Pandu RanganPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
- signcryption scheme
- public key
- private key
- key management scheme
- key management
- identity based cryptography
- bilinear pairings
- public key cryptography
- identity based signature
- public key infrastructure
- standard model
- electronic voting
- ring signature
- security mechanisms
- digital signature
- security analysis
- security policies
- security model
- trusted third party
- provably secure
- diffie hellman
- key distribution
- wireless sensor networks
- secret sharing scheme
- secure communication
- rfid systems
- access control
- encryption scheme
- information security
- elliptic curve
- authentication protocol
- security protocols
- ad hoc networks
- intrusion detection
- lower bound
- upper bound
- security services
- authentication scheme
- security requirements
- resource constrained
- blind signature
- mobile ad hoc networks
- protection scheme
- secret key
- ciphertext