Login / Signup
Identity-Based Key-Insulated Signcryption.
Jianhong Chen
Kefei Chen
Yongtao Wang
Xiangxue Li
Yu Long
Zhongmei Wan
Published in:
Informatica (2012)
Keyphrases
</>
signcryption scheme
standard model
identity based signature
key management
bilinear pairings
public key
signature scheme
security model
key distribution
encryption scheme
identity based cryptography
ad hoc networks
provably secure
resource constrained
group communication
ciphertext
proxy re encryption
response time