Secure Hierarchical Identity-Based Identification without Random Oracles.
Atsushi FujiokaTaiichi SaitoKeita XagawaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2014)
Keyphrases
- identity based signature
- standard model
- signature scheme
- identity based encryption
- cca secure
- encryption scheme
- ciphertext
- provably secure
- identity based cryptography
- diffie hellman
- threshold signature scheme
- public key
- proxy re encryption
- key management
- key distribution
- chosen plaintext
- digital signature
- public key cryptosystem
- security analysis
- private key
- signcryption scheme
- bilinear pairings
- security model
- blind signature
- authentication protocol
- automatic identification