Security enhancement of a novel proxy key generation protocol.
Chiung-Chou TsaiKuan-Chieh LiaoTzungher ChenWei-Bin LeePublished in: COMPSAC (2) (2007)
Keyphrases
- trusted third party
- cryptographic protocols
- security protocols
- authentication protocol
- security model
- key agreement protocol
- key exchange protocol
- security properties
- communication protocols
- intrusion detection
- security analysis
- secure multiparty computation
- mutual authentication
- security requirements
- ban logic
- proxy re encryption
- electronic voting
- physical layer
- key agreement
- rfid systems
- image enhancement
- denial of service attacks
- provably secure
- security services
- protocol specification
- statistical databases
- blind signature
- privacy preserving
- key distribution
- elliptic curve
- diffie hellman
- virtual private network
- security issues
- mobile payment
- security mechanisms
- ring signature scheme
- secure routing
- formal analysis
- lightweight
- messages exchanged
- key establishment
- public key
- security policies
- information security
- third party
- access control
- original signer
- bilinear pairings
- key exchange
- secure communication
- mobile agent system
- group communication
- network management
- computer networks
- load balancing
- contractual obligations