Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More.
David DerlerSebastian RamacherDaniel SlamanigPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- digital signature
- signature verification
- smart card
- security mechanisms
- public key cryptography
- authentication scheme
- digital watermarking
- authentication protocol
- real time
- trusted third party
- security requirements
- orders of magnitude
- signature recognition
- databases
- security systems
- anomaly detection
- biometric authentication
- database
- authentication mechanism