Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.
Tianjie CaoDongdai LinPublished in: CISC (2005)
Keyphrases
- signature scheme
- public key
- security analysis
- designated verifier
- private key
- standard model
- proxy signature scheme
- security model
- digital signature
- encryption scheme
- secret key
- signcryption scheme
- blind signature
- user authentication
- security properties
- proxy signature
- diffie hellman
- public key cryptography
- authentication protocol
- blind signature scheme
- bilinear pairings
- provably secure
- secure communication
- key distribution
- ring signature
- authentication scheme
- data sharing
- lightweight