Login / Signup
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Ji-Jian Chin
Rouzbeh Behnia
Swee-Huay Heng
Raphael Chung-Wei Phan
Published in:
AsiaJCIS (2013)
Keyphrases
</>
identity based signature
key distribution
key management
standard model
identity based cryptography
signature scheme
key management scheme
provably secure
security model
encryption scheme
signcryption scheme
digital signature scheme
diffie hellman
secret sharing scheme
private key
public key encryption
identity based encryption
cca secure
secure communication
security analysis
public key
public key encryption scheme
proxy re encryption
authentication scheme
bilinear pairings
authentication mechanism
key agreement protocol
authentication protocol
key agreement
secret sharing
secret key
blind signature scheme
blind signature
electronic voting
key establishment
group communication
key exchange
security requirements
security services
digital signature
security protocols
ad hoc networks
elliptic curve
wireless sensor networks
public key cryptography
high security
data encryption
ciphertext
resource constrained
security issues
smart card
elliptic curve cryptography
user authentication
session key
key exchange protocol
mutual authentication
security patterns
chosen plaintext
public key cryptosystem
forward secure
authentication and key agreement