Login / Signup
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption.
Benoît Libert
Thomas Peters
Chen Qian
Published in:
ESORICS (2) (2018)
Keyphrases
</>
worst case
lower bound
upper bound
computer security
intrusion detection
information security
small size
security systems
security problems
security measures
ring signature scheme
network security
security issues
security requirements
signature verification