Better than Advertised Security for Non-interactive Threshold Signatures.
Mihir BellareElizabeth C. CritesChelsea KomloMary MallerStefano TessaroChenzhi ZhuPublished in: CRYPTO (4) (2022)
Keyphrases
- information security
- network security
- virtual reality
- security requirements
- signcryption scheme
- computer graphics
- intrusion detection
- security policies
- security issues
- security problems
- user friendly
- user interaction
- key management
- security protocols
- signature verification
- security management
- network management
- computer security
- security analysis
- data security