Forgery Attacks on Two Pairing-Based Proxy Signature Schemes.
Chan WangXiaotong FuPublished in: iThings/CPSCom (2011)
Keyphrases
- chosen message
- signature scheme
- bilinear pairings
- proxy signature
- original signer
- threshold signature scheme
- proxy signature scheme
- standard model
- public key
- blind signature scheme
- identity based cryptography
- proxy signer
- blind signature
- key management
- diffie hellman
- provably secure
- designated verifier
- signcryption scheme
- group signature scheme
- ring signature
- forward secure
- proxy re encryption
- public key cryptography
- digital signature scheme
- private key
- secret key
- hash functions
- key distribution