On the security of joint signature and encryption revisited.
Mridul NandiTapas PanditPublished in: J. Math. Cryptol. (2016)
Keyphrases
- private key
- digital signature
- encryption algorithms
- security properties
- key management
- encryption decryption
- encryption scheme
- digital copyright protection
- public key
- security mechanisms
- data encryption
- high security
- encryption algorithm
- security analysis
- secret key
- public key infrastructure
- elliptic curve cryptography
- identity authentication
- key exchange
- public key cryptography
- mutual authentication
- elliptic curve
- signature scheme
- security issues
- virtual private network
- security requirements
- data confidentiality
- blind signature scheme
- security model
- cryptographic protocols
- blind signature
- access control
- resource constrained
- identity based cryptography
- integrity verification
- intrusion detection
- ciphertext
- signature verification
- data security
- security policies
- information security
- diffie hellman
- image encryption
- stream cipher
- authentication scheme
- security level
- data integrity
- network security
- standard model
- advanced encryption standard
- network management