Login / Signup

A Method for Embedding Secret Key Information in RSA Public Key and Its Application.

Motoki KitaharaTakashi NishideKouichi Sakurai
Published in: IMIS (2012)
Keyphrases
  • public key
  • secret key
  • signature scheme
  • authentication protocol
  • digital signature
  • private key
  • authentication scheme
  • similarity measure
  • data streams
  • encryption scheme
  • security analysis
  • public key cryptography