An efficient and secure scheme for smart home communication using identity-based signcryption.
Yosef AshibaniQusay H. MahmoudPublished in: IPCCC (2017)
Keyphrases
- identity based signature
- standard model
- smart home
- key management
- signcryption scheme
- signature scheme
- key distribution
- key management scheme
- identity based cryptography
- secure communication
- bilinear pairings
- security model
- diffie hellman
- group communication
- resource constrained
- provably secure
- private key
- secret sharing scheme
- activity recognition
- context aware
- encryption scheme
- proxy re encryption
- smart home environment
- assisted living
- public key
- digital signature
- ubiquitous environments
- human activities
- ambient intelligence
- identity based encryption
- ad hoc networks
- secret key
- secret sharing
- blind signature scheme
- embedded systems
- cryptographic protocols
- wireless sensor networks
- blind signature
- security protocols
- intelligent systems
- machine learning
- public key cryptography
- security services
- ciphertext
- authentication protocol
- elliptic curve
- security analysis
- security requirements
- computer networks
- ring signature
- cca secure
- management system