Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.
Shanshan DuanZhenfu CaoYuan ZhouPublished in: CIS (2) (2005)
Keyphrases
- signcryption scheme
- bilinear pairings
- standard model
- key management
- key distribution
- diffie hellman
- private key
- provably secure
- identity based cryptography
- public key
- encryption scheme
- designated verifier
- blind signature
- signature scheme
- security analysis
- digital signature
- access control
- public key cryptography
- resource constrained
- wireless sensor networks
- forward secure
- conflict resolution
- ring signature scheme
- electronic voting
- group communication
- blind signature scheme
- secret key
- trusted third party
- authentication protocol
- cryptographic protocols
- security services
- ad hoc networks
- ciphertext
- security protocols
- elliptic curve
- original signer
- fault tolerant
- security model
- secret sharing scheme