Receiver-deniable Public-Key Encryption.
Maged Hamada IbrahimPublished in: Int. J. Netw. Secur. (2009)
Keyphrases
- authentication protocol
- public key
- public key encryption
- identity based encryption
- security analysis
- secret key
- security model
- proxy re encryption
- standard model
- provably secure
- encryption scheme
- ciphertext
- signature scheme
- rfid tags
- diffie hellman
- smart card
- public key cryptosystem
- hash functions
- lightweight
- low cost
- database