An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries.
Jason ChiaJi-Jian ChinPublished in: IEEE Access (2020)
Keyphrases
- signcryption scheme
- identity based cryptography
- key distribution
- key management
- provably secure
- identity based encryption
- identity based signature
- standard model
- signature scheme
- encryption scheme
- secret sharing scheme
- security model
- bilinear pairings
- blind signature scheme
- proxy re encryption
- key management scheme
- private key
- public key
- cca secure
- digital signature scheme
- blind signature
- security analysis
- lower bound
- diffie hellman
- upper bound
- elliptic curve
- secret key
- public key cryptosystem
- fault tolerant
- key agreement
- secure communication
- authentication scheme
- secret sharing
- public key encryption
- security problems
- designated verifier
- key agreement protocol
- authentication protocol
- worst case
- elliptic curve cryptography
- digital signature
- ad hoc networks
- access control
- authentication and key agreement
- chosen plaintext