On the Security of Identity Based Threshold Unsigncryption Schemes.
S. Sharmila Deva SelviS. Sree VivekChandrasekaran Pandu RanganS. PritiPublished in: NSS (2010)
Keyphrases
- signcryption scheme
- bilinear pairings
- standard model
- identity based signature
- key management
- identity based cryptography
- key management scheme
- provably secure
- key distribution
- encryption scheme
- public key
- signature scheme
- key agreement
- blind signature scheme
- ad hoc networks
- intrusion detection
- security issues
- security analysis
- diffie hellman
- public key encryption
- wireless sensor networks
- public key cryptography
- resource constrained
- security requirements
- network security
- wireless networks
- low cost