An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries.
Renu Mary DanielElijah Blessing RajsinghSalaja SilasPublished in: Inf. Comput. (2020)
Keyphrases
- key agreement protocol
- key distribution
- provably secure
- authenticated key agreement
- diffie hellman
- key agreement
- diffie hellman assumption
- key management
- signature scheme
- standard model
- identity based signature
- encryption scheme
- bilinear pairings
- identity based encryption
- signcryption scheme
- private key
- security model
- public key
- key exchange
- blind signature
- fault tolerant
- identity based cryptography
- public key cryptography
- hash functions
- threshold signature scheme
- group communication
- elliptic curve
- blind signature scheme
- secure communication
- secret sharing scheme
- secret key
- public key encryption
- wireless sensor networks
- digital signature
- authentication protocol
- ciphertext
- key exchange protocol
- security protocols
- security properties
- security analysis