Security Analysis of Two Signcryption Schemes.
Guilin WangRobert H. DengDong Jin KwakSang-Jae MoonPublished in: ISC (2004)
Keyphrases
- security analysis
- security properties
- public key
- bilinear pairings
- encryption scheme
- key management scheme
- private key
- signcryption scheme
- security requirements
- security model
- smart card
- provably secure
- key management
- public key cryptography
- high security
- signature scheme
- authentication protocol
- diffie hellman
- standard model
- blind signature scheme
- mutual authentication
- authentication scheme
- user authentication
- information security
- network security
- wireless sensor networks