On Proofs of Security for DAA Schemes.
Liqun ChenPaul MorrisseyNigel P. SmartPublished in: ProvSec (2008)
Keyphrases
- bilinear pairings
- trusted computing
- identity based cryptography
- provably secure
- information security
- key management
- signcryption scheme
- intrusion detection
- network security
- key management scheme
- access control
- security issues
- blind signature scheme
- signature scheme
- security policies
- key agreement
- blind signature
- computer security
- security services
- security systems
- security requirements
- statistical databases
- theorem prover
- computing environments
- security problems
- security threats
- security protocols
- information systems
- computing platform
- sensitive data
- data encryption
- theorem proving
- public key encryption