On the Security of Identity Based Threshold Unsigncryption Schemes.
S. Sharmila Deva SelviS. Sree VivekS. PritiC. Pandu RanganPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- signcryption scheme
- bilinear pairings
- standard model
- identity based signature
- identity based cryptography
- key management
- provably secure
- key management scheme
- signature scheme
- public key
- security model
- identity based encryption
- encryption scheme
- blind signature scheme
- key agreement
- access control
- security threats
- key distribution
- security systems
- key agreement protocol
- digital signature
- security mechanisms
- proxy re encryption
- resource constrained
- ad hoc networks
- information security
- wireless sensor networks
- ciphertext
- blind signature
- elliptic curve
- security analysis