An efficient and provable secure identity-based ring signcryption scheme.
Zhenchao ZhuYuqing ZhangFengjiao WangPublished in: Comput. Stand. Interfaces (2009)
Keyphrases
- signcryption scheme
- standard model
- key management
- key distribution
- private key
- bilinear pairings
- encryption scheme
- designated verifier
- signature scheme
- diffie hellman
- public key
- provably secure
- digital signature
- identity based cryptography
- wireless sensor networks
- security analysis
- ad hoc networks
- fault tolerant
- cryptographic protocols
- group communication
- resource constrained
- ring signature
- secret key
- ciphertext
- elliptic curve
- security protocols
- security services
- secure communication
- low cost