Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.
Seiko AritaKoji TsurudomePublished in: ACNS (2009)
Keyphrases
- public key
- signcryption scheme
- signature scheme
- security model
- security analysis
- public key cryptography
- digital signature
- private key
- image authentication
- diffie hellman
- secret key
- authentication protocol
- blind signature scheme
- elliptic curve cryptography
- blind signature
- authentication scheme
- standard model
- proxy re encryption
- partially blind signature scheme
- provably secure
- public key infrastructure