Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation.
Maharage Nisansala Sevwandi PereraTakeshi KoshibaPublished in: ICICS (2018)
Keyphrases
- access control
- designated verifier
- security model
- key management
- public key cryptography
- information security
- java card
- security requirements
- digital signature
- public key
- intrusion detection
- public key cryptosystem
- key distribution
- security systems
- statistical databases
- cyber security
- elliptic curve
- security mechanisms
- security issues
- security problems
- concept lattice
- network security
- signature verification
- security analysis
- computer security
- group members
- security level
- security threats