Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices.
Éric SageloliPierre PébereauPierrick MéauxCéline ChevalierPublished in: ACNS (1) (2023)
Keyphrases
- signature scheme
- key management
- signcryption scheme
- bilinear pairings
- designated verifier
- identity based cryptography
- digital signature
- identity based signature
- encryption scheme
- public key cryptosystem
- key distribution
- private key
- blind signature scheme
- standard model
- lower bound
- provably secure
- upper bound
- information security
- access control
- security requirements
- diffie hellman
- public key
- worst case
- ad hoc networks
- network security
- security protocols
- security policies
- authentication and key agreement
- wireless sensor networks
- security properties
- security issues
- signature verification
- security analysis
- key exchange
- security problems
- blind signature
- security level
- data security
- cca secure
- optimal solution
- resource constrained