ID-Based Deniable Threshold Ring Authentication.
Chunhua JinChunxiang XuLinzhi JiangFagen LiPublished in: HPCC/CSS/ICESS (2015)
Keyphrases
- authentication protocol
- public key
- key distribution
- signcryption scheme
- ring signature
- security analysis
- smart card
- signature scheme
- ring signature scheme
- secret key
- authentication scheme
- electronic voting
- security model
- blind signature
- user authentication
- lightweight
- private key
- encryption scheme
- mutual authentication
- public key cryptography
- security protocols
- key agreement
- designated verifier
- bilinear pairings
- secure communication
- digital signature
- rfid tags
- hash functions
- security properties
- diffie hellman
- trusted third party
- partially blind signature scheme