The Security of the FDH Variant of Chaum's Undeniable Signature Scheme.
Wakaha OgataKaoru KurosawaSwee-Huay HengPublished in: Public Key Cryptography (2005)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- digital signature
- private key
- public key
- diffie hellman
- standard model
- provably secure
- diffie hellman assumption
- blind signature
- blind signature scheme
- identity based signature
- key distribution
- bilinear pairings
- threshold signature scheme
- security model
- security analysis
- key management
- designated verifier
- identity based cryptography
- encryption scheme
- security mechanisms
- secret key
- public key cryptography
- cca secure
- secure communication
- electronic voting
- information security
- authentication protocol
- security properties
- security requirements
- signcryption scheme
- cryptographic protocols
- intrusion detection
- nearest neighbor