Security weakness of a certificate-based proxy signature scheme for IIoT environments.
Je Hong ParkWoo-Hwan KimPublished in: Inf. Process. Lett. (2024)
Keyphrases
- proxy signature scheme
- security analysis
- forward secure
- information security
- designated verifier
- security requirements
- security model
- access control
- network security
- intrusion detection
- security issues
- standard model
- authentication protocol
- blind signature scheme
- security properties
- diffie hellman
- computing environments
- information systems