Security Analysis of an Identity-Based Signature From Factorization Problem.
Ganglin ZhangYongjian LiaoYu FanYikuan LiangPublished in: IEEE Access (2020)
Keyphrases
- security analysis
- standard model
- encryption scheme
- public key
- signature scheme
- identity based cryptography
- smart card
- security model
- security requirements
- authentication protocol
- security properties
- digital signature
- provably secure
- key management
- software systems
- ciphertext
- public key cryptography
- blind signature scheme
- distributed systems