Post-Quantum Secure Ring Signatures for Security and Privacy in the Cybertwin-Driven 6G.
Jinhui LiuYong YuKai LiLe GaoPublished in: IEEE Internet Things J. (2021)
Keyphrases
- security issues
- secure multiparty computation
- security measures
- security mechanisms
- sensitive data
- privacy preserving
- security requirements
- security properties
- security concerns
- security services
- data security
- information security
- identity management
- rfid systems
- security threats
- authentication protocol
- electronic payment
- user privacy
- digital signature
- cryptographic protocols
- homomorphic encryption
- protection mechanisms
- security management
- security protocols
- smart card
- mutual authentication
- data confidentiality
- security level
- access control
- key management
- cloud computing
- security analysis
- data privacy
- statistical databases
- personal data
- semi honest
- security and privacy issues
- preserving privacy
- trusted third party
- privacy protection
- security policies
- private information
- encryption key
- privacy preserving data mining
- security risks
- security model
- encryption scheme
- computer security
- data protection
- electronic transactions
- intrusion detection
- differential privacy
- scalar product
- electronic voting
- public key infrastructure
- authentication scheme