Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Xinyi HuangWilly SusiloYi MuFutai ZhangPublished in: AINA (2005)
Keyphrases
- key management
- preserving privacy
- key management scheme
- bilinear pairings
- signcryption scheme
- signature scheme
- provably secure
- ring signature
- public key cryptography
- identity based signature
- identity based cryptography
- personal information
- privacy preserving
- digital signature
- ad hoc networks
- standard model
- data privacy
- key distribution
- wireless sensor networks
- security protocols
- security services
- encryption scheme
- resource constrained
- public key
- private information
- blind signature
- blind signature scheme
- hash functions
- elliptic curve
- data mining applications
- secure communication
- secret sharing scheme
- privacy issues
- secret key
- original signer
- diffie hellman
- security properties
- smart card
- cryptographic protocols
- differential privacy
- privacy preservation
- cloud computing
- electronic voting
- sensor networks
- sensitive information
- privacy preserving data mining