Security of Lu et al.'s proxy-protected signature scheme.
Je Hong ParkBo Gyeong KangPublished in: Appl. Math. Comput. (2005)
Keyphrases
- signature scheme
- blind signature scheme
- bilinear pairings
- digital signature scheme
- blind signature
- identity based cryptography
- public key cryptosystem
- proxy signature
- proxy signature scheme
- provably secure
- diffie hellman
- standard model
- identity based signature
- private key
- original signer
- public key
- diffie hellman assumption
- partially blind signature scheme
- threshold signature scheme
- electronic voting
- digital signature
- forward secure
- designated verifier
- signcryption scheme
- key management
- proxy re encryption
- proxy signer
- trusted third party
- key distribution
- ring signature
- secret key
- lightweight
- hash functions
- intrusion detection
- access control
- peer to peer
- cca secure
- security analysis
- public key cryptography