A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings".
Lihua LiuZhengjun CaoPublished in: CoRR (2015)
Keyphrases
- bilinear pairings
- key management
- diffie hellman
- provably secure
- blind signature
- identity based cryptography
- public key cryptography
- blind signature scheme
- signature scheme
- electronic voting
- threshold signature scheme
- standard model
- public key
- digital signature
- group communication
- key distribution
- partially blind signature scheme
- ad hoc networks
- encryption scheme
- private key
- information systems
- wireless sensor networks
- service providers
- signcryption scheme
- secure communication
- elliptic curve
- forward secure
- resource constrained
- secret key
- security analysis
- security protocols
- security model
- security issues
- security requirements
- hash functions
- security services
- security properties
- cryptographic protocols
- access control