Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir BellareChanathip NamprempreGregory NevenPublished in: EUROCRYPT (2004)
Keyphrases
- signature scheme
- identity based signature
- digital signature scheme
- standard model
- public key cryptosystem
- identity based cryptography
- private key
- diffie hellman
- blind signature
- security model
- public key
- signcryption scheme
- bilinear pairings
- provably secure
- designated verifier
- blind signature scheme
- key distribution
- threshold signature scheme
- electronic voting
- digital signature
- group signature scheme
- key management
- ring signature
- security analysis
- information security
- public key cryptography
- security requirements
- encryption scheme
- proxy signature scheme
- security issues
- cca secure
- hash functions
- access control
- proxy re encryption
- wireless sensor networks
- secure communication