A note on the security of KHL scheme.
Jian WengYunlei ZhaoRobert H. DengShengli LiuYanjiang YangKouichi SakuraiPublished in: Theor. Comput. Sci. (2015)
Keyphrases
- digital signature scheme
- security analysis
- identity based cryptography
- security policies
- key distribution
- intrusion detection
- authentication scheme
- information security
- authentication mechanism
- key agreement protocol
- secure communication
- security model
- computer security
- elliptic curve
- access control
- security requirements
- authentication protocol
- elliptic curve cryptography
- high security
- public key
- key agreement
- security issues
- electronic voting
- protection scheme
- security protocols
- security problems
- security properties
- secret sharing
- secret sharing scheme