Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability.
Meng WangHui LiZhijing LiuPublished in: ICCNMC (2005)
Keyphrases
- bilinear pairings
- provably secure
- signcryption scheme
- key management
- identity based cryptography
- standard model
- identity based signature
- signature scheme
- security properties
- blind signature scheme
- diffie hellman
- security model
- proxy signature
- key management scheme
- public key cryptography
- proxy signature scheme
- blind signature
- public key
- original signer
- encryption scheme
- designated verifier
- key distribution
- proxy re encryption
- key agreement protocol
- hash functions
- resource constrained
- identity based encryption
- lightweight
- private key
- secret sharing scheme
- security requirements
- ad hoc networks
- authentication and key agreement
- secure communication
- group communication
- secret sharing
- forward secure
- wireless sensor networks