OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss.
Jason ChiaJi-Jian ChinSook-Chin YipPublished in: ProvSec (2021)
Keyphrases
- key management
- signcryption scheme
- encryption scheme
- identity based cryptography
- random number generator
- authentication and key agreement
- key distribution
- network security
- lower bound
- statistical databases
- information security
- intrusion detection
- theorem proving
- security problems
- standard model
- upper bound
- security issues
- signature scheme
- resource constrained
- security protocols
- security properties
- provably secure
- worst case
- wireless sensor networks
- blind signature
- blind signature scheme
- information systems
- peer to peer
- elliptic curve
- access control
- public key
- biometric systems
- security policies