Login / Signup
Code-based authentication with designated verifier.
Yan Ren
Hongbin Wang
Jiali Du
Liqiong Ma
Published in:
Int. J. Grid Util. Comput. (2016)
Keyphrases
</>
designated verifier
signature scheme
proxy signature scheme
source code
ring signature scheme
public key
authentication protocol
security model
private key
key distribution
public key cryptography
security analysis