On the security of a modified Beth identity-based identification scheme.
Ji-Jian ChinSyh-Yuan TanSwee-Huay HengRaphael C.-W. PhanPublished in: Inf. Process. Lett. (2013)
Keyphrases
- signcryption scheme
- identity based cryptography
- key distribution
- key management
- identity based signature
- standard model
- signature scheme
- identity based encryption
- provably secure
- digital signature scheme
- bilinear pairings
- encryption scheme
- proxy re encryption
- blind signature scheme
- security model
- key management scheme
- public key
- secret sharing scheme
- private key
- designated verifier
- public key cryptosystem
- cca secure
- public key encryption
- diffie hellman
- statistical databases
- security analysis
- security protocols
- security issues
- authentication protocol
- information security
- authentication scheme
- protection scheme
- key agreement
- chosen plaintext
- access control
- authentication mechanism
- blind signature
- secret sharing
- wireless sensor networks
- graphical password
- key agreement protocol
- public key cryptography
- key exchange
- high security
- secret key
- intrusion detection
- authentication and key agreement