On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption.
Masayuki FukumitsuShingo HasegawaShuji IsobeHiroki ShizuyaPublished in: ACISP (2014)
Keyphrases
- signature scheme
- digital signature scheme
- key exchange
- public key
- elliptic curve cryptography
- private key
- digital signature
- public key cryptography
- elliptic curve
- cryptographic algorithms
- security model
- modular exponentiation
- designated verifier
- diffie hellman
- secure communication
- provably secure
- key distribution
- security analysis
- public key cryptosystems
- bilinear pairings
- security mechanisms
- encryption scheme
- security protocols
- key management
- high security
- intrusion detection
- information security
- secret key
- authentication scheme
- security policies
- public key infrastructure
- security systems
- authentication protocol
- standard model
- security issues
- security services
- statistical databases
- cryptographic protocols
- information systems
- signature verification
- computer security