A Secure Proxy Re-Signature Scheme for IoT.
Vinh Duc TranPhi Thuong LeViet Cuong TrinhPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2023)
Keyphrases
- signature scheme
- bilinear pairings
- standard model
- key management
- digital signature scheme
- diffie hellman
- proxy signature
- proxy re encryption
- digital signature
- identity based signature
- private key
- proxy signature scheme
- blind signature
- original signer
- provably secure
- public key
- key distribution
- designated verifier
- trusted third party
- threshold signature scheme
- proxy signer
- identity based cryptography
- chosen message
- electronic voting
- secret key
- forward secure
- public key cryptosystem
- security model
- blind signature scheme
- security analysis
- resource constrained
- authentication scheme
- public key cryptography
- wireless sensor networks
- group communication
- cryptographic protocols
- secure communication
- ciphertext
- group signature scheme
- cca secure
- security properties
- security protocols
- encryption scheme
- cloud computing
- ring signature
- signcryption scheme
- security services
- elliptic curve
- ad hoc networks
- partially blind signature scheme