Tightly-Secure Signatures from Five-Move Identification Protocols.
Eike KiltzJulian LossJiaxin PanPublished in: ASIACRYPT (3) (2017)
Keyphrases
- cryptographic protocols
- security protocols
- signature recognition
- key exchange
- key distribution
- authentication protocol
- signature verification
- multi party
- key agreement protocol
- key establishment
- secure multiparty computation
- digital signature
- security services
- key management
- security requirements
- user authentication
- security properties
- anti collision
- communication protocols
- authentication scheme
- group communication
- smart card
- distributed systems