A Provable Security Scheme of ID-Based Threshold Decryption.
Xue-Guang WangZhen-Chuan ChaiPublished in: e-Forensics (2009)
Keyphrases
- signcryption scheme
- encryption scheme
- standard model
- key agreement
- diffie hellman
- secret key
- secure communication
- bilinear pairings
- secret sharing scheme
- key distribution
- blind signature
- blind signature scheme
- public key
- identity based cryptography
- provably secure
- ring signature scheme
- key management
- security analysis
- ciphertext
- designated verifier
- security model
- secret sharing
- electronic voting
- private key
- elliptic curve
- key agreement protocol
- encryption algorithm
- public key cryptosystem
- signature scheme
- digital signature scheme
- encryption decryption
- authentication scheme
- digital signature
- smart card
- authentication mechanism
- partially blind signature scheme
- public key cryptography
- high security
- security issues
- encrypted data
- security protocols
- security policies
- hash functions
- ad hoc networks