An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings.
Xi SunZhengtao JiangMeirong ZhouYumin WangPublished in: INCoS (2012)
Keyphrases
- signature scheme
- key distribution
- private key
- standard model
- identity based signature
- public key
- diffie hellman
- digital signature scheme
- digital signature
- bilinear pairings
- public key cryptography
- authentication scheme
- secret key
- designated verifier
- security analysis
- provably secure
- threshold signature scheme
- blind signature
- identity based cryptography
- public key cryptosystem
- session key
- group signature scheme
- encryption scheme
- group communication
- authentication protocol
- trusted third party
- key agreement protocol
- secure communication
- blind signature scheme
- authentication and key agreement
- authentication mechanism
- signcryption scheme
- user authentication
- security mechanisms
- proxy signature scheme
- identity management
- multipath
- proxy signature
- security model
- peer to peer