An Efficient MQ-based Signature with Tight Security Proof.
Hiroki FurueDung Hoang DuongTsuyoshi TakagiPublished in: Int. J. Netw. Comput. (2020)
Keyphrases
- digital copyright protection
- security issues
- computer security
- lower bound
- worst case
- upper bound
- security systems
- security management
- security problems
- blind signature scheme
- neural network
- security policies
- information security
- statistical databases
- network management
- protection scheme
- security level
- information assurance
- ring signature scheme
- objective function
- security protocols
- human operators
- theorem proving
- network security
- access control
- distributed systems