Login / Signup
Signcryption schemes with threshold unsigncryption, and applications.
Javier Herranz
Alexandre Ruiz
Germán Sáez
Published in:
Des. Codes Cryptogr. (2014)
Keyphrases
</>
signcryption scheme
bilinear pairings
key management scheme
standard model
key management
wireless sensor networks
public key
provably secure
identity based cryptography
real time
resource constrained
mobile ad hoc networks
end to end
threshold values
low cost
digital images
identity based signature