Login / Signup
Efficient proxy signcryption scheme with provable CCA and CMA security.
Han-Yu Lin
Tzong-Sun Wu
Shih-Kun Huang
Yi-Shiung Yeh
Published in:
Comput. Math. Appl. (2010)
Keyphrases
</>
signcryption scheme
bilinear pairings
identity based cryptography
key management
standard model
intrusion detection
information security
key distribution
private key
data streams
data management
security issues
public key
canonical correlation analysis
provably secure