Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Lei ZhangQianhong WuJosep Domingo-FerrerBo QinPeng ZengPublished in: Inf. Sci. (2014)
Keyphrases
- provably secure
- signature scheme
- information security
- public key cryptography
- security model
- designated verifier
- bilinear pairings
- intrusion detection
- public key
- authentication and key agreement
- access control
- blind signature
- key management
- security requirements
- cellular automata
- signature verification
- security protocols
- cryptographic protocols
- computer security
- encryption scheme
- signcryption scheme
- encryption algorithms
- public key cryptosystem
- privacy preserving