Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Jori WinderickxAn BraekenDave SingeléeRoel PeetersThijs VandenrytRonald ThoelenNele MentensPublished in: CF (2018)
Keyphrases
- embedded devices
- digital signature
- key management
- data storage
- trusted third party
- bilinear pairings
- embedded systems
- signature scheme
- public key
- security protocols
- provably secure
- data integrity
- limited memory
- flash memory
- smart card
- blind signature scheme
- mobile devices
- elliptic curve
- wireless sensor networks
- ad hoc networks
- security mechanisms
- resource constrained
- file system
- main memory
- database management systems
- data management
- blind signature
- software engineering