Digital Signatures Out of Second-Preimage Resistant Hash Functions.
Erik DahmenKatsuyuki OkeyaTsuyoshi TakagiCamille VuillaumePublished in: PQCrypto (2008)
Keyphrases
- hash functions
- digital signature
- signature scheme
- public key
- smart card
- similarity search
- key management
- secret key
- designated verifier
- elliptic curve
- security mechanisms
- standard model
- data distribution
- hyperplane
- hamming distance
- image processing
- data integrity
- digital watermarking
- ad hoc networks
- end to end
- watermarking technique
- high dimensional data
- lightweight
- dimensionality reduction
- multiscale