Keyphrases
- bilinear pairings
- public key cryptography
- public key
- threshold signature scheme
- provably secure
- elliptic curve
- identity based cryptography
- blind signature scheme
- signature scheme
- partially blind signature scheme
- forward secure
- key management
- blind signature
- security model
- security services
- digital signature
- signcryption scheme
- proxy signature scheme
- standard model
- diffie hellman
- wireless sensor networks
- security analysis
- efficient computation
- hash functions
- personal information
- information security