A scalable trace and revoke scheme with security enhancements.
Hassan M. ElkamchouchiYasmine AbouelseoudPublished in: CCNC (2008)
Keyphrases
- digital signature scheme
- trusted third party
- identity based cryptography
- statistical databases
- protection scheme
- authentication scheme
- access control
- key agreement
- security analysis
- high security
- key establishment
- elliptic curve cryptography
- secure communication
- lightweight
- information security
- security model
- blind signature
- ring signature scheme
- elliptic curve
- secret key
- key management scheme
- security requirements
- chosen plaintext
- private key
- security policies
- electronic voting
- mutual authentication
- provably secure
- information systems
- key distribution