Keyphrases
- provably secure
- standard model
- key management
- security model
- hash functions
- public key
- blind signature
- signature scheme
- blind signature scheme
- partially blind signature scheme
- threshold signature scheme
- encryption scheme
- security protocols
- security analysis
- diffie hellman
- ad hoc networks
- end to end
- secret sharing scheme
- access control
- resource constrained
- intrusion detection