Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing.
Niansheng LiuDonghui GuoPublished in: CIS (2006)
Keyphrases
- security analysis
- public key encryption scheme
- public key
- encryption scheme
- security model
- standard model
- signature scheme
- private key
- public key cryptography
- security properties
- digital signature
- secret key
- authentication protocol
- smart card
- secret sharing scheme
- secure communication
- diffie hellman
- security requirements
- provably secure
- blind signature scheme
- forward secure
- ciphertext
- blind signature
- data sharing