ID-based deniable ring authentication with constant-size signature.
Lingling WangGuoyin ZhangChunguang MaPublished in: Frontiers Comput. Sci. China (2008)
Keyphrases
- authentication protocol
- public key
- ring signature
- signature scheme
- ring signature scheme
- key distribution
- security analysis
- electronic voting
- digital signature
- blind signature
- private key
- blind signature scheme
- user authentication
- public key cryptography
- secret key
- lightweight
- smart card
- authentication scheme
- secure communication
- provably secure
- standard model
- security protocols
- rfid tags
- partially blind signature scheme
- diffie hellman
- mutual authentication
- security model
- bilinear pairings
- hash functions