Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks.
Zhenfeng ZhangKang YangJiang ZhangCheng ChenPublished in: SSR (2015)
Keyphrases
- signature scheme
- private key
- digital signature scheme
- public key
- public key cryptosystem
- digital signature
- security mechanisms
- standard model
- provably secure
- diffie hellman
- blind signature
- security threats
- secure communication
- chosen message
- blind signature scheme
- diffie hellman assumption
- designated verifier
- block cipher
- identity based signature
- security analysis
- key distribution
- cryptographic protocols
- bilinear pairings
- threshold signature scheme
- secret key
- access control
- security protocols
- security issues
- countermeasures
- information security
- hash functions
- security requirements
- signcryption scheme
- public key cryptography
- cca secure
- security model
- intrusion detection
- database systems
- lightweight
- authentication scheme