Identity-Based Secure DistributedData Storage Schemes.
Jinguang HanWilly SusiloYi MuPublished in: IEEE Trans. Computers (2014)
Keyphrases
- identity based signature
- standard model
- key management
- key management scheme
- provably secure
- signature scheme
- identity based cryptography
- security model
- key distribution
- bilinear pairings
- encryption scheme
- diffie hellman
- wireless sensor networks
- public key encryption
- signcryption scheme
- storage and retrieval
- public key
- storage requirements
- blind signature
- digital signature
- ciphertext
- identity based encryption
- cryptographic algorithms
- forward secure
- storage systems
- security services
- security protocols
- resource constrained
- ad hoc networks
- key exchange
- cloud storage
- cryptographic protocols
- security analysis
- proxy re encryption
- security requirements
- data storage
- lightweight