Keyphrases
- signature scheme
- digital signature scheme
- bilinear pairings
- standard model
- identity based signature
- proxy re encryption
- proxy signature scheme
- public key cryptosystem
- original signer
- proxy signature
- identity based cryptography
- private key
- diffie hellman
- public key
- blind signature
- provably secure
- threshold signature scheme
- electronic voting
- security properties
- proxy signer
- designated verifier
- ring signature
- blind signature scheme
- security model
- key distribution
- signcryption scheme
- security analysis
- group signature scheme
- digital signature
- cca secure
- elliptic curve
- intrusion detection
- information security
- key management
- forward secure
- security requirements
- security policies
- security mechanisms
- security issues
- public key cryptography
- authentication protocol
- secret key
- network security
- cryptographic protocols