Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security.
Sunil PrajapatPankaj KumarSandeep KumarAshok Kumar DasSachin ShettyM. Shamim HossainPublished in: IEEE Access (2024)
Keyphrases
- signature scheme
- blind signature
- blind signature scheme
- provably secure
- key distribution
- diffie hellman
- key management
- identity based signature
- standard model
- electronic voting
- public key
- private key
- public key cryptosystem
- key agreement protocol
- digital copyright protection
- session key
- digital signature
- authentication and key agreement
- cryptographic protocols
- bilinear pairings
- security model
- security protocols
- secret key
- key exchange protocol
- signcryption scheme
- identity based cryptography
- authentication protocol
- key exchange
- encryption scheme
- public key cryptography
- identity based encryption
- security analysis
- key agreement
- group communication
- designated verifier
- forward secure
- trusted third party
- wireless sensor networks
- secure communication
- mutual authentication
- security services
- security properties
- ciphertext
- proxy re encryption
- rfid systems
- homomorphic encryption
- security problems
- hash functions
- network security
- fault tolerant
- lightweight