Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
Chao-Liang LiuGwoboa HorngHsin-Yu LiuPublished in: IEICE Trans. Commun. (2005)
Keyphrases
- key distribution
- signature scheme
- elliptic curve
- private key
- public key cryptosystem
- secret key
- cellular automata
- blind signature scheme
- user interaction
- user profiles
- blind signature
- user defined
- key management
- user interface
- designated verifier
- standard model
- cca secure
- partially blind signature scheme
- provably secure
- secret sharing scheme
- public key
- user satisfaction
- collaborative filtering
- end users