Provable Secure Generalized Signcryption.
Xu An WangXiaoyuan YangJindan ZhangPublished in: J. Comput. (2010)
Keyphrases
- key management
- key management scheme
- security properties
- standard model
- trusted third party
- signcryption scheme
- encryption scheme
- key distribution
- identity based signature
- private key
- security analysis
- security protocols
- group communication
- diffie hellman
- digital signature
- neural network
- provably secure
- resource constrained
- ad hoc networks
- distributed systems
- bilinear pairings
- identity based cryptography
- low cost