Pitfalls in identity based encryption using an elliptic curve combined public key.
Xiangxue LiHaifeng QianYuan ZhouPublished in: Appl. Math. Lett. (2012)
Keyphrases
- public key
- elliptic curve cryptography
- identity based encryption
- digital signature
- diffie hellman
- public key cryptography
- elliptic curve
- public key encryption
- security model
- security analysis
- encryption scheme
- signature scheme
- secret key
- proxy re encryption
- public key cryptosystem
- provably secure
- secure communication
- ciphertext
- blind signature scheme
- authentication protocol
- cca secure
- authentication scheme
- private key
- cost effective
- key management
- blind signature
- end to end