Stronger Security and Constructions of Multi-designated Verifier Signatures.
Ivan DamgårdHelene HaaghRebekah MercerAnca NitulescuClaudio OrlandiSophia YakoubovPublished in: TCC (2) (2020)
Keyphrases
- designated verifier
- security model
- ring signature scheme
- signcryption scheme
- signature scheme
- proxy signature scheme
- security requirements
- access control
- standard model
- security analysis
- public key
- private key
- key management
- provably secure
- public key cryptography
- blind signature scheme
- user privacy
- blind signature
- bilinear pairings
- information security
- key distribution
- diffie hellman
- digital signature
- statistical databases