On the Security of Two Threshold Signature Schemes with Traceable Signers.
Guilin WangXiaoxi HanBo ZhuPublished in: ACNS (2003)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- signcryption scheme
- standard model
- designated verifier
- identity based signature
- blind signature
- diffie hellman
- private key
- public key
- provably secure
- blind signature scheme
- threshold signature scheme
- security model
- bilinear pairings
- digital signature
- key distribution
- electronic voting
- group signature scheme
- access control
- cca secure
- network security
- ring signature
- chosen message
- intrusion detection
- public key cryptography
- key management
- encryption scheme
- secret key
- security policies
- information security
- proxy re encryption
- authentication scheme
- security properties
- authentication protocol
- security issues
- identity based cryptography
- formal model