ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution.
Lein HarnShoubao YangPublished in: IEEE J. Sel. Areas Commun. (1993)
Keyphrases
- key management
- key distribution
- digital signature
- provably secure
- bilinear pairings
- signature scheme
- elliptic curve
- wireless sensor networks
- blind signature
- ad hoc networks
- secret key
- secure communication
- resource constrained
- key agreement
- smart card
- public key
- security protocols
- group communication
- secret sharing scheme
- diffie hellman
- blind signature scheme
- authentication protocol
- private key
- signcryption scheme
- public key cryptography
- trusted third party
- security services
- standard model
- end to end
- energy consumption
- real time