Security Analysis of Two Signature Schemes and Their Improved Schemes.
Jianhong ZhangJane MaoPublished in: ICCSA (1) (2007)
Keyphrases
- security analysis
- public key
- signature scheme
- provably secure
- proxy signature scheme
- security model
- standard model
- bilinear pairings
- encryption scheme
- designated verifier
- digital signature
- blind signature
- private key
- smart card
- security requirements
- public key cryptography
- diffie hellman
- secret key
- security properties
- authentication protocol
- forward secure
- blind signature scheme
- information systems
- user authentication
- secure communication
- hash functions
- lightweight
- image compression
- ring signature
- database systems