A post-quantum communication secure identity-based proxy-signcryption scheme.
Xiaojun ZhangChunxiang XuChunhua JinJunwei WenPublished in: Int. J. Electron. Secur. Digit. Forensics (2015)
Keyphrases
- signcryption scheme
- bilinear pairings
- standard model
- key management
- key distribution
- proxy re encryption
- group communication
- diffie hellman
- resource constrained
- private key
- secure communication
- encryption scheme
- identity based cryptography
- provably secure
- public key
- designated verifier
- security analysis
- cryptographic protocols
- secret key
- fault tolerant
- signature scheme
- forward secure
- wireless sensor networks
- ad hoc networks
- digital signature
- secret sharing scheme
- security services
- security properties
- multi party
- security protocols
- secret sharing
- public key cryptography
- blind signature
- wireless ad hoc networks
- security mechanisms
- security issues
- smart card