Malicious KGC Attacks in Certificateless Cryptography.
Man Ho AuJing ChenJoseph K. LiuYi MuDuncan S. WongGuomin YangPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- private key
- public key cryptography
- public key
- signature scheme
- malicious users
- malicious attacks
- detect malicious
- detecting malicious
- digital signature
- insider threat
- security analysis
- standard model
- security model
- provably secure
- bilinear pairings
- security mechanisms
- malicious nodes
- secret key
- diffie hellman
- blind signature
- authentication protocol
- blind signature scheme
- cryptographic protocols
- key distribution
- watermarking technique
- wireless sensor networks
- elliptic curve
- encryption scheme
- similarity search
- digital images