A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle.
Xiaoming HuHong LuYan LiuJian WangWenAn TanPublished in: ICCSA (1) (2015)
Keyphrases
- proxy signature scheme
- designated verifier
- security model
- signcryption scheme
- security analysis
- security requirements
- signature scheme
- public key
- access control
- standard model
- original signer
- security properties
- forward secure
- private key
- security issues
- provably secure
- bilinear pairings
- proxy signature
- diffie hellman
- public key cryptography
- blind signature
- security mechanisms
- security policies
- information security
- key distribution
- blind signature scheme
- digital signature
- key management
- intrusion detection
- cryptographic protocols
- encryption scheme
- secret key
- statistical databases
- proxy signer
- ring signature
- network security