On Tight Security Proofs for Schnorr Signatures.
Nils FleischhackerTibor JagerDominique SchröderPublished in: ASIACRYPT (1) (2014)
Keyphrases
- lower bound
- upper bound
- intrusion detection
- security requirements
- security problems
- security policies
- theorem proving
- information security
- network security
- access control
- security systems
- statistical databases
- security issues
- security mechanisms
- security level
- security management
- signature verification
- security measures
- theorem prover
- diffie hellman
- user authentication
- security model
- cyber security
- computer security
- privacy preserving
- signature scheme