On the Security of Two Ring Signcryption Schemes.
S. Sree VivekS. Sharmila Deva SelviC. Pandu RanganPublished in: SECRYPT (2009)
Keyphrases
- key management scheme
- key management
- identity based signature
- ring signature
- standard model
- electronic voting
- bilinear pairings
- signcryption scheme
- security properties
- ring signature scheme
- identity based cryptography
- wireless sensor networks
- signature scheme
- key agreement
- provably secure
- security model
- ad hoc networks
- resource constrained
- public key
- blind signature
- security requirements
- blind signature scheme
- security protocols
- public key cryptography
- sensor networks
- access control
- intrusion detection
- network security
- security policies
- security issues
- mobile ad hoc networks
- diffie hellman
- security services
- group communication
- private key
- digital signature
- encryption scheme
- elliptic curve
- computer security