Some security bounds for the DGHV scheme.
Franca MarinelliRiccardo AragonaChiara MarcollaMassimiliano SalaPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- digital signature scheme
- identity based cryptography
- high security
- lower bound
- intrusion detection
- authentication mechanism
- network security
- security analysis
- authentication scheme
- key distribution
- electronic voting
- information security
- security model
- secure communication
- key agreement protocol
- elliptic curve cryptography
- security policies
- upper bound
- security systems
- elliptic curve
- security threats
- security issues
- provably secure
- data encryption
- access control