Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction.
Helger LipmaaGuilin WangFeng BaoPublished in: ICALP (2005)
Keyphrases
- designated verifier
- signature scheme
- security model
- private key
- signcryption scheme
- diffie hellman
- blind signature
- public key
- security mechanisms
- standard model
- provably secure
- proxy signature scheme
- blind signature scheme
- security protocols
- security requirements
- bilinear pairings
- access control
- electronic voting
- cryptographic protocols
- key distribution
- security analysis
- security issues
- identity based cryptography
- authentication protocol
- public key cryptography
- digital signature
- key management
- smart card
- information security
- secret key
- secure communication
- encryption scheme
- security policies
- ring signature
- authentication scheme
- network security
- hash functions
- proxy signature
- watermarking algorithm
- security properties
- wireless sensor networks
- resource constrained