Simulatable and secure certificate-based threshold signature without pairings.
Feng WangChin-Chen ChangLein HarnPublished in: Secur. Commun. Networks (2014)
Keyphrases
- public key encryption
- authentication mechanism
- factor authentication
- public key infrastructure
- cryptographic protocols
- security issues
- data encryption
- security mechanisms
- security protocols
- key exchange
- key distribution
- authentication and access control
- security level
- information systems
- security analysis
- information security
- smart card
- lightweight
- multi dimensional