Short Identity-Based Signatures with Tight Security from Lattices.
Jiaxin PanBenedikt WagnerPublished in: PQCrypto (2021)
Keyphrases
- signcryption scheme
- signature scheme
- key management
- bilinear pairings
- designated verifier
- identity based cryptography
- identity based signature
- encryption scheme
- public key cryptosystem
- standard model
- blind signature scheme
- digital signature
- intrusion detection
- information security
- blind signature
- diffie hellman
- private key
- public key
- upper bound
- key distribution
- access control
- provably secure
- authentication and key agreement
- security policies
- security issues
- network security
- ad hoc networks
- lower bound
- security problems
- cyber security
- security analysis
- statistical databases
- identity based encryption
- user authentication
- security protocols
- public key cryptography
- security requirements
- malicious traffic
- information systems