Security Enhancement of Identity-Based Identification with Reversibility.
Atsushi FujiokaTaiichi SaitoKeita XagawaPublished in: ICICS (2012)
Keyphrases
- key management
- signcryption scheme
- encryption scheme
- identity based cryptography
- key distribution
- information security
- authentication and key agreement
- information assurance
- security issues
- security policies
- statistical databases
- bilinear pairings
- image enhancement
- security mechanisms
- access control
- network security
- security requirements
- markov chain
- security level
- image processing
- low cost
- blind signature scheme
- security services
- cyber attacks
- security model
- standard model
- intrusion detection
- resource constrained
- signature scheme
- ad hoc networks
- markov processes
- security properties
- security threats
- security analysis
- diffie hellman
- sensitive data
- wireless sensor networks
- identity based signature