Combined schemes for signature and encryption: The public-key and the identity-based setting.
María Isabel González VascoFlorian HessRainer SteinwandtPublished in: Inf. Comput. (2016)
Keyphrases
- public key
- signature scheme
- digital signature
- bilinear pairings
- provably secure
- public key cryptography
- private key
- encryption scheme
- blind signature scheme
- identity based encryption
- secret key
- ciphertext
- blind signature
- security analysis
- elliptic curve cryptography
- standard model
- signcryption scheme
- security model
- image authentication
- public key encryption
- key management
- diffie hellman
- public key cryptosystem
- public key infrastructure
- identity based cryptography
- proxy signature
- secure communication
- key distribution
- authentication protocol
- key exchange
- encryption algorithm
- authentication scheme
- image encryption
- proxy re encryption
- forward secure
- real time
- secret sharing scheme
- cryptographic protocols
- trusted third party
- session key
- cca secure
- partially blind signature scheme