Security weaknesses of a signature scheme and authenticated key agreement protocols.
Peter NosePublished in: Inf. Process. Lett. (2014)
Keyphrases
- key agreement protocol
- signature scheme
- diffie hellman
- provably secure
- standard model
- public key
- key distribution
- key exchange protocol
- diffie hellman assumption
- digital signature scheme
- public key cryptosystem
- threshold signature scheme
- blind signature
- designated verifier
- bilinear pairings
- security model
- key management
- secret key
- blind signature scheme
- public key cryptography
- security properties
- digital signature
- elliptic curve
- encryption scheme
- group communication
- private key
- hash functions
- secure communication
- security analysis
- authentication scheme