A novel trusted third party based signcryption scheme.
Shamsher UllahXiang-Yang LiLan ZhangPublished in: Multim. Tools Appl. (2020)
Keyphrases
- trusted third party
- signcryption scheme
- key distribution
- digital signature
- public key
- standard model
- key management
- third party
- private key
- security services
- credit card
- authentication protocol
- fault tolerant
- signature scheme
- privacy protection
- resource constrained
- encryption scheme
- secret key
- wireless sensor networks
- secret sharing scheme
- ad hoc networks
- security protocols
- network security
- elliptic curve
- wireless ad hoc networks