Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem.
Nedal TahatPublished in: Int. J. Comput. Appl. Technol. (2016)
Keyphrases
- elliptic curve
- diffie hellman
- key exchange
- key agreement protocol
- encryption scheme
- key distribution
- public key cryptosystems
- scalar multiplication
- digital signature
- elliptic curve cryptography
- key management
- secret sharing scheme
- public key cryptography
- provably secure
- secret key
- private key
- modular exponentiation
- public key
- security analysis
- efficient computation
- sensor networks
- standard model
- low cost