Distributed Signcryption Schemes with Formal Proof of Security.
Indivar GuptaP. K. SaxenaPublished in: InfoSecHiComNet (2011)
Keyphrases
- formal proof
- key management scheme
- key management
- security properties
- identity based signature
- bilinear pairings
- identity based cryptography
- signcryption scheme
- provably secure
- security model
- standard model
- key agreement
- theorem prover
- wireless sensor networks
- group communication
- blind signature scheme
- distributed systems
- information security
- security requirements
- security protocols
- access control
- distributed environment
- lightweight
- ad hoc networks
- security mechanisms
- fault tolerant
- network security
- intrusion detection
- peer to peer
- security issues
- statistical databases
- artificial intelligence
- mobile agents
- computing environments
- blind signature
- security analysis
- formal model
- resource constrained
- secret key
- mobile ad hoc networks
- signature scheme
- security policies