A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory.
K. Preetha MathewSachin VasantC. Pandu RanganPublished in: ICISC (2013)
Keyphrases
- provably secure
- standard model
- signcryption scheme
- signature scheme
- bilinear pairings
- blind signature
- threshold signature scheme
- blind signature scheme
- key management
- public key
- digital signature
- private key
- public key cryptography
- forward secure
- diffie hellman
- security model
- key distribution
- hash functions
- cryptographic protocols
- encryption scheme
- security analysis