A New Construction of Identity-Based Signcryption without Random Oracles.
Jia FanYuliang ZhengXiaohu TangPublished in: Int. J. Found. Comput. Sci. (2014)
Keyphrases
- signcryption scheme
- standard model
- bilinear pairings
- signature scheme
- threshold signature scheme
- identity based signature
- key management
- ciphertext
- encryption scheme
- ring signature
- provably secure
- identity based cryptography
- diffie hellman
- public key
- forward secure
- cca secure
- key distribution
- private key
- construction process
- blind signature scheme
- blind signature
- key management scheme
- ad hoc networks
- proxy re encryption
- secure communication
- data sets
- cryptographic protocols
- elliptic curve
- security analysis
- wireless sensor networks