Securing Internet of Drones With Identity-Based Proxy Signcryption.
Muhammad Asghar KhanHabib ShahSajjad Ur RehmanNeeraj KumarRozaida GhazaliDanish ShehzadInsaf UllahPublished in: IEEE Access (2021)
Keyphrases
- bilinear pairings
- signcryption scheme
- key management
- standard model
- signature scheme
- proxy re encryption
- provably secure
- identity based cryptography
- proxy signature
- blind signature scheme
- designated verifier
- public key
- proxy signature scheme
- identity based signature
- public key cryptography
- diffie hellman
- encryption scheme
- trusted third party
- blind signature
- internet users
- secure communication
- proxy servers
- security mechanisms
- resource constrained
- wireless networks
- mobile devices