Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Wenjie YangJian WengAnjia YangCongge XieYaxi YangPublished in: Inf. Sci. (2018)
Keyphrases
- provably secure
- identity based encryption
- malicious users
- key management
- public key cryptography
- detecting malicious
- standard model
- security protocols
- security model
- encryption scheme
- public key
- hash functions
- signature scheme
- blind signature
- resource constrained
- blind signature scheme
- cryptographic protocols
- ad hoc networks
- diffie hellman
- security mechanisms
- wireless sensor networks
- bilinear pairings
- ciphertext
- private key
- secret sharing scheme
- watermarking scheme
- security analysis
- end to end
- key distribution
- secure communication
- elliptic curve
- response time