The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Zhenchao ZhuYuqing ZhangFengjiao WangPublished in: ProvSec (2008)
Keyphrases
- signcryption scheme
- provably secure
- standard model
- key management
- bilinear pairings
- public key
- blind signature
- security model
- key distribution
- partially blind signature scheme
- encryption scheme
- diffie hellman
- blind signature scheme
- signature scheme
- digital signature
- private key
- designated verifier
- smart card
- wireless sensor networks
- security analysis
- group communication
- resource constrained
- image compression
- electronic voting