Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Ji-Jian ChinSyh-Yuan TanSwee-Huay HengRaphael C.-W. PhanPublished in: Cryptogr. Commun. (2016)
Keyphrases
- signcryption scheme
- identity based cryptography
- key management
- key distribution
- chosen plaintext
- identity based signature
- security threats
- standard model
- provably secure
- security protocols
- security mechanisms
- security problems
- bilinear pairings
- signature scheme
- security measures
- security issues
- cryptographic protocols
- security model
- cyber attacks
- denial of service attacks
- security requirements
- secret sharing scheme
- security breaches
- encryption scheme
- computer security
- security vulnerabilities
- java card
- identity based encryption
- blind signature scheme
- authentication and key agreement
- diffie hellman
- security analysis
- resource constrained
- private key
- secure communication
- security policies
- public key cryptography
- cca secure
- security risks
- elliptic curve cryptography
- authentication protocol
- access control
- protection schemes
- elliptic curve
- stream cipher
- proxy re encryption
- protection scheme
- public key cryptosystem
- malicious users
- countermeasures
- ciphertext
- authentication scheme
- biometric template
- blind signature
- security properties
- security services
- information security
- digital watermarking
- intrusion detection