On the Joint Security of Encryption and Signature, Revisited.
Kenneth G. PatersonJacob C. N. SchuldtMartijn StamSusan ThomsonPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- private key
- digital signature
- encryption algorithms
- encryption scheme
- security properties
- encryption decryption
- public key
- high security
- key management
- digital copyright protection
- data encryption
- key exchange
- security analysis
- encryption algorithm
- security mechanisms
- identity authentication
- public key cryptography
- data confidentiality
- image encryption
- integrity verification
- security issues
- intrusion detection
- digital rights management
- signature scheme
- secret key
- cryptographic algorithms
- elliptic curve cryptography
- virtual private network
- information security
- mutual authentication
- data security
- blind signature scheme
- access control
- public key infrastructure
- blind signature
- key distribution
- authentication scheme
- elliptic curve
- ciphertext
- ring signature scheme
- secure communication
- stream cipher
- network security
- resource constrained
- identity based cryptography
- signature verification
- standard model
- data integrity
- security level
- security policies
- ad hoc networks
- digital watermarking
- security model
- security protocols