A comparison between traditional public key infrastructures and identity-based cryptography.
Kenneth G. PatersonGeraint PricePublished in: Inf. Secur. Tech. Rep. (2003)
Keyphrases
- public key
- digital signature
- identity based cryptography
- bilinear pairings
- public key cryptography
- security analysis
- signcryption scheme
- security model
- signature scheme
- key management
- secret key
- blind signature scheme
- smart card
- private key
- provably secure
- diffie hellman
- blind signature
- authentication protocol
- encryption scheme
- trusted third party
- rfid tags
- standard model
- data management