An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Ji-Jian ChinRouzbeh BehniaSwee-Huay HengRaphael Chung-Wei PhanPublished in: AsiaJCIS (2013)
Keyphrases
- identity based signature
- key distribution
- key management
- standard model
- identity based cryptography
- signature scheme
- key management scheme
- provably secure
- security model
- encryption scheme
- signcryption scheme
- digital signature scheme
- diffie hellman
- secret sharing scheme
- private key
- public key encryption
- identity based encryption
- cca secure
- secure communication
- security analysis
- public key
- public key encryption scheme
- proxy re encryption
- authentication scheme
- bilinear pairings
- authentication mechanism
- key agreement protocol
- authentication protocol
- key agreement
- secret sharing
- secret key
- blind signature scheme
- blind signature
- electronic voting
- key establishment
- group communication
- key exchange
- security requirements
- security services
- digital signature
- security protocols
- ad hoc networks
- elliptic curve
- wireless sensor networks
- public key cryptography
- high security
- data encryption
- ciphertext
- resource constrained
- security issues
- smart card
- elliptic curve cryptography
- user authentication
- session key
- key exchange protocol
- mutual authentication
- security patterns
- chosen plaintext
- public key cryptosystem
- forward secure
- authentication and key agreement