Security Vulnerability of ID-Based Key Sharing Schemes.
Jung Yeon HwangTaek-Young YounWilly SusiloPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2009)
Keyphrases
- key agreement
- provably secure
- key management
- bilinear pairings
- high security
- private key
- protection schemes
- security properties
- key management scheme
- diffie hellman
- security vulnerabilities
- public key
- access control
- risk assessment
- ring signature scheme
- blind signature scheme
- key distribution
- secure communication
- security issues
- security requirements
- elliptic curve
- encryption scheme
- key agreement protocol
- blind signature
- authentication scheme
- secret key
- security problems
- partially blind signature scheme
- penetration testing
- signature scheme
- standard model
- denial of service
- dos attacks
- signcryption scheme
- cryptographic protocols
- statistical databases
- buffer overflow
- wireless sensor networks
- security policies
- risk management
- network security
- security risks