Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir BellareChanathip NamprempreGregory NevenPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- signature scheme
- identity based signature
- digital signature scheme
- standard model
- public key cryptosystem
- private key
- identity based cryptography
- blind signature
- diffie hellman
- public key
- bilinear pairings
- signcryption scheme
- provably secure
- security model
- blind signature scheme
- designated verifier
- key distribution
- electronic voting
- threshold signature scheme
- digital signature
- group signature scheme
- forward secure
- proxy signature scheme
- hash functions
- encryption scheme
- security analysis
- key management
- secret key
- public key cryptography
- secure communication
- low cost
- security properties
- proxy signature
- cryptographic protocols
- network security
- third party
- security issues
- intrusion detection
- access control