Attacks on Authentication and Signature Schemes Involving Corruption of Public Key (Modulus).
Michael Kara-IvaniovEran IcelandAviad KipnisPublished in: FDTC (2008)
Keyphrases
- signature scheme
- public key
- public key cryptography
- image authentication
- private key
- security analysis
- authentication protocol
- authentication scheme
- standard model
- chosen ciphertext
- elliptic curve cryptography
- key distribution
- cryptographic protocols
- digital signature
- secure communication
- secret key
- security model
- public key infrastructure
- blind signature
- diffie hellman
- security mechanisms
- provably secure
- encryption scheme
- group signature scheme
- user authentication
- public key cryptosystem
- bilinear pairings
- blind signature scheme
- security services
- digital watermarking
- proxy signature
- proxy re encryption
- partially blind signature scheme
- security protocols