Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol?
Jan-Hendrik EvertseEugène van HeystPublished in: EUROCRYPT (1992)
Keyphrases
- signature scheme
- digital signature
- public key
- digital signature scheme
- provably secure
- key exchange
- elliptic curve
- key distribution
- signature verification
- blind signature
- cryptographic algorithms
- high level
- trusted third party
- standard model
- lightweight
- security analysis
- higher level
- computer graphics
- diffie hellman
- authentication protocol
- security mechanisms
- signature recognition
- smart card
- modular exponentiation
- domain specific
- end to end
- secure communication
- security model
- public key cryptography
- anomaly detection
- blind signature scheme
- elliptic curve cryptography
- neural network