Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security.
Chun-I FanYi-Fan TsengPublished in: Symmetry (2015)
Keyphrases
- identity based encryption
- key management
- encryption scheme
- key distribution
- key exchange
- standard model
- public key
- ciphertext
- diffie hellman
- key agreement protocol
- provably secure
- security model
- secret key
- security analysis
- key exchange protocol
- authentication scheme
- authentication and key agreement
- public key cryptography
- cca secure
- private key
- identity based cryptography
- signature scheme
- digital signature
- proxy re encryption
- signcryption scheme
- password based authenticated key exchange
- session key
- canonical correlation analysis
- digital signature scheme
- bilinear pairings
- encryption algorithms
- encryption decryption
- ad hoc networks
- security properties
- encryption algorithm
- wireless sensor networks
- resource constrained
- group communication
- elliptic curve cryptography
- elliptic curve
- security requirements
- data encryption
- stream cipher
- security services
- public key cryptosystem
- secure communication
- public key infrastructure
- identity authentication
- secret sharing scheme
- security protocols
- hash functions
- fault tolerant
- advanced encryption standard
- access control
- peer to peer