Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!
Miroslaw KutylowskiGiuseppe PersianoDuong Hieu PhanMoti YungMarcin ZawadaPublished in: CRYPTO (2) (2023)
Keyphrases
- key distribution
- signature verification
- security analysis
- signature scheme
- key management
- mutual authentication
- digital signature
- authentication scheme
- authentication protocol
- fault tolerant
- identity authentication
- biometric authentication
- user authentication
- secure communication
- signature recognition
- secret key
- public key
- session key
- authentication mechanism
- private key
- smart card
- image authentication
- fragile watermarking
- public key cryptography
- factor authentication
- data sets
- diffie hellman
- security properties
- security model
- security requirements
- privacy protection
- ad hoc networks
- wireless sensor networks