Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles.
Chik How TanPublished in: ARES (2008)
Keyphrases
- identity based signature
- standard model
- signature scheme
- key management scheme
- provably secure
- bilinear pairings
- key management
- diffie hellman
- threshold signature scheme
- wireless sensor networks
- signcryption scheme
- blind signature
- public key
- encryption scheme
- security model
- chosen plaintext
- blind signature scheme
- cca secure
- key distribution
- security properties
- ciphertext
- secure communication
- resource constrained
- key agreement
- elliptic curve
- private key
- ad hoc networks
- public key cryptography
- mobile ad hoc networks
- keywords
- third party
- proxy re encryption
- rfid tags
- security issues
- secret key
- security analysis
- authentication scheme
- digital signature