Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing.
Jianhong ZhangWenle BaiYuehai WangPublished in: IEEE Access (2019)
Keyphrases
- signature scheme
- bilinear pairings
- proxy signature
- partially blind signature scheme
- public key
- proxy signature scheme
- blind signature
- key management
- designated verifier
- standard model
- ring signature scheme
- ring signature
- threshold signature scheme
- original signer
- blind signature scheme
- digital signature scheme
- provably secure
- digital signature
- proxy signer
- mobile devices
- proxy re encryption
- identity based cryptography
- diffie hellman
- signcryption scheme
- public key cryptosystem
- secret key
- proxy blind signature
- forward secure
- key distribution
- electronic voting
- designated verifier signature
- peer to peer