Post-quantum secure identity-based signature achieving forward secrecy.
Surbhi ShawRatna DuttaPublished in: J. Inf. Secur. Appl. (2022)
Keyphrases
- identity based signature
- identity based cryptography
- standard model
- key management
- signature scheme
- security model
- key distribution
- security analysis
- ad hoc networks
- wireless sensor networks
- encryption scheme
- digital signature
- public key
- security protocols
- provably secure
- resource constrained
- security properties
- cryptographic protocols
- secret sharing scheme
- security requirements
- elliptic curve
- group communication
- diffie hellman
- blind signature
- wireless networks
- routing protocol
- conflict resolution
- public key cryptography
- signcryption scheme
- similarity measure