Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Jinguang HanYe YangXinyi HuangTsz Hon YuenJiguo LiJie CaoPublished in: Inf. Sci. (2016)
Keyphrases
- ciphertext
- encryption scheme
- standard model
- proxy re encryption
- chosen plaintext attack
- security analysis
- cca secure
- identity based encryption
- secret key
- key distribution
- secret sharing scheme
- private key
- signcryption scheme
- diffie hellman
- key management
- public key
- mobile phone
- mobile commerce
- encryption algorithm
- electronic commerce
- mobile devices
- secret sharing
- authentication scheme
- image encryption
- high security
- public key cryptography
- bilinear pairings
- identity based cryptography
- business models
- provably secure
- stream cipher
- hash functions
- cache invalidation
- smart card
- authentication and key agreement
- security properties
- authentication protocol
- data sharing
- mobile users