Secure Hierarchical Identity-Based Identification without Random Oracles.
Atsushi FujiokaTaiichi SaitoKeita XagawaPublished in: ISC (2012)
Keyphrases
- identity based signature
- standard model
- signature scheme
- identity based encryption
- cca secure
- encryption scheme
- provably secure
- ciphertext
- diffie hellman
- signcryption scheme
- key management
- digital signature
- public key
- key distribution
- proxy re encryption
- private key
- bilinear pairings
- security model
- blind signature
- chosen plaintext
- threshold signature scheme
- blind signature scheme
- public key cryptosystem
- cryptographic protocols
- security analysis
- authentication scheme
- hash functions
- hierarchical structure
- neural network