Notes on Two Flawed Attacks on Undeniable Signature Schemes.
Rouzbeh BehniaSwee-Huay HengPublished in: ICITCS (2013)
Keyphrases
- peer to peer
- signature scheme
- digital signature
- standard model
- chosen ciphertext
- chosen message
- threshold signature scheme
- public key
- designated verifier
- countermeasures
- group signature scheme
- digital signature scheme
- public key cryptosystem
- watermarking scheme
- secret key
- blind signature
- diffie hellman
- bilinear pairings
- cryptographic protocols
- provably secure
- key distribution
- ring signature
- private key
- hash functions