An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem.
Chandrashekhar MeshramPublished in: Inf. Process. Lett. (2015)
Keyphrases
- encryption scheme
- elliptic curve cryptography
- elliptic curve
- digital signature
- signature scheme
- public key
- public key cryptography
- key management
- diffie hellman
- blind signature
- cryptographic algorithms
- security properties
- security analysis
- standard model
- group signature scheme
- blind signature scheme
- secret key
- encryption decryption
- data encryption standard
- bilinear pairings
- secret sharing scheme
- private key
- partially blind signature scheme
- key distribution
- ciphertext
- image encryption
- security model
- floating point
- error correction
- data sharing
- hash functions
- secure communication
- authentication scheme
- high security
- matrix factorization
- ad hoc networks
- wireless sensor networks