An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes.
Daniel KalesGreg ZaveruchaPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- signature scheme
- chosen message
- standard model
- bilinear pairings
- identity based signature
- secret key
- provably secure
- public key
- threshold signature scheme
- designated verifier
- diffie hellman
- public key cryptosystem
- group signature scheme
- ciphertext
- digital signature scheme
- digital signature
- blind signature
- ring signature
- blind signature scheme
- identity based cryptography
- security analysis
- countermeasures
- private key
- key distribution
- security model