Comments on the Security Proofs of Some Signature Schemes Based on Factorization.
Wakaha OgataNaoya MatsumotoPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2007)
Keyphrases
- signature scheme
- digital signature scheme
- identity based signature
- public key cryptosystem
- standard model
- identity based cryptography
- diffie hellman
- blind signature
- private key
- public key
- provably secure
- threshold signature scheme
- blind signature scheme
- security model
- key distribution
- group signature scheme
- digital signature
- electronic voting
- designated verifier
- bilinear pairings
- signcryption scheme
- information security
- public key cryptography
- security issues
- authentication protocol
- encryption scheme
- security requirements
- statistical databases
- hash functions
- authentication scheme
- security protocols
- key management
- cca secure
- access control