Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Partha Sarathi RoyKirill MorozovKazuhide FukushimaShinsaku KiyomotoTsuyoshi TakagiPublished in: ICISSP (2019)
Keyphrases
- efficient implementation
- security analysis
- signature scheme
- public key
- proxy signature scheme
- standard model
- private key
- digital signature
- designated verifier
- security model
- encryption scheme
- secret key
- authentication protocol
- blind signature
- diffie hellman
- user authentication
- public key cryptography
- source code
- blind signature scheme
- smart card
- provably secure
- security properties
- authentication scheme
- bilinear pairings
- key distribution
- forward secure
- security requirements