Login / Signup
Tightly Secure Signatures From Lossy Identification Schemes.
Michel Abdalla
Pierre-Alain Fouque
Vadim Lyubashevsky
Mehdi Tibouchi
Published in:
J. Cryptol. (2016)
Keyphrases
</>
signature recognition
data compression
key management scheme
digital signature
key management
provably secure
public key encryption
lightweight
security issues
signature verification
wireless sensor networks
user authentication
key agreement