The security of the FDH variant of Chaum's undeniable signature scheme.
Wakaha OgataKaoru KurosawaSwee-Huay HengPublished in: IEEE Trans. Inf. Theory (2006)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- digital signature
- standard model
- private key
- blind signature
- blind signature scheme
- diffie hellman
- provably secure
- public key
- identity based signature
- diffie hellman assumption
- threshold signature scheme
- key management
- key distribution
- electronic voting
- designated verifier
- bilinear pairings
- security model
- secret key
- identity based cryptography
- data envelopment analysis
- information security
- security analysis
- signcryption scheme
- low cost
- security properties
- cca secure
- encryption scheme
- partially blind signature scheme
- feature space
- secure communication
- cryptographic protocols
- authentication protocol
- security issues
- hash functions
- intrusion detection
- access control