Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme.
Maryam Rajabzadeh AsaarMahmoud SalmasizadehWilly SusiloPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- provably secure
- bilinear pairings
- proxy signature scheme
- proxy signature
- designated verifier
- signature scheme
- key management
- standard model
- signcryption scheme
- security model
- forward secure
- blind signature scheme
- blind signature
- public key cryptography
- public key
- diffie hellman
- security analysis
- original signer
- hash functions
- private key
- encryption scheme
- electronic voting
- access control
- secure communication
- wireless sensor networks
- security services
- ciphertext
- digital signature
- resource constrained
- security requirements
- ad hoc networks
- lightweight
- key distribution
- elliptic curve