On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments.
Wenjie YangShangpeng WangXinyi HuangYi MuPublished in: IEEE Access (2019)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- provably secure
- blind signature
- diffie hellman
- standard model
- diffie hellman assumption
- private key
- public key
- blind signature scheme
- bilinear pairings
- identity based signature
- designated verifier
- key distribution
- threshold signature scheme
- digital signature
- identity based cryptography
- security model
- signcryption scheme
- public key cryptography
- secret key
- key agreement protocol
- access control
- security analysis
- key management
- encryption scheme
- information security
- security requirements
- similarity search
- formal model
- hash functions
- security policies
- security issues
- security mechanisms
- sensor networks