Efficient and Identity-based Signcryption with Provably-secure.
Yiling WenJianfeng MaSang-Jae MoonPublished in: J. Digit. Content Technol. its Appl. (2010)
Keyphrases
- provably secure
- key management
- bilinear pairings
- standard model
- signcryption scheme
- signature scheme
- public key
- security model
- identity based cryptography
- blind signature
- blind signature scheme
- public key cryptography
- wireless sensor networks
- resource constrained
- key distribution
- ring signature
- ad hoc networks
- diffie hellman
- secret sharing scheme
- electronic voting
- hash functions
- security protocols
- encryption scheme
- secure communication
- group communication
- elliptic curve
- security analysis
- security mechanisms
- forward secure