Privacy Preservation and Drone Authentication Using ID-Based Signcryption.
Sana BenzartiBayrem TrikiOuajdi KorbaaPublished in: SoMeT (2018)
Keyphrases
- privacy preservation
- signcryption scheme
- key distribution
- bilinear pairings
- public key cryptography
- key management
- private key
- privacy preserving
- ring signature
- public key
- signature scheme
- standard model
- trusted third party
- privacy protection
- privacy preserving data mining
- data privacy
- security analysis
- secret key
- provably secure
- sensitive information
- authentication protocol
- data mining
- electronic voting
- blind signature scheme
- diffie hellman
- encryption scheme
- data quality
- security services
- sensitive data
- ad hoc networks
- elliptic curve
- digital signature
- secure communication
- resource constrained
- private information
- security mechanisms
- wireless sensor networks
- blind signature
- database systems
- real world
- data analysis
- security properties
- smart card
- security protocols
- distributed data