The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Narn-Yih LeeTzonelih HwangChih-Hung WangPublished in: Inf. Process. Lett. (1999)
Keyphrases
- key distribution
- signature scheme
- key agreement protocol
- key management
- diffie hellman
- public key
- authentication protocol
- key agreement
- blind signature scheme
- blind signature
- ring signature scheme
- security protocols
- private key
- provably secure
- security properties
- cryptographic protocols
- signcryption scheme
- security services
- encryption scheme
- standard model
- communication protocols
- key exchange
- security issues
- security requirements
- electronic voting
- security model
- secret key
- fault tolerant
- information security
- designated verifier
- security analysis
- bilinear pairings
- key establishment
- partially blind signature scheme
- group communication
- application level
- resource constrained
- access control
- security mechanisms
- ring signature
- wireless sensor networks
- authentication scheme
- elliptic curve
- mutual authentication
- statistical databases
- formal model
- ad hoc networks
- lightweight
- secure multiparty computation
- ns simulator