Identity-based deniable authenticated encryption and its application to e-mail system.
Fagen LiZhaohui ZhengChunhua JinPublished in: Telecommun. Syst. (2016)
Keyphrases
- authentication protocol
- key distribution
- key exchange
- secret key
- encryption scheme
- security analysis
- public key
- authentication scheme
- private key
- key management
- smart card
- ciphertext
- cryptographic protocols
- security protocols
- group communication
- public key cryptography
- identity based encryption
- session key
- digital signature
- lightweight
- signcryption scheme
- signature scheme
- security properties
- spam filtering
- rfid tags
- diffie hellman
- hash functions
- secure communication
- key exchange protocol
- security model
- standard model
- real time
- instant messaging
- encryption algorithm
- key agreement protocol
- anti spam
- resource constrained
- information security
- peer to peer
- wireless sensor networks
- spam e mail