Security Analysis of Some Batch Verifying Signatures from Pairings.
Tianjie CaoDongdai LinRui XuePublished in: Int. J. Netw. Secur. (2006)
Keyphrases
- security analysis
- public key
- smart card
- digital signature
- high security
- security requirements
- security model
- signature scheme
- designated verifier
- mutual authentication
- encryption scheme
- image encryption
- authentication protocol
- user authentication
- security properties
- proxy signature scheme
- access control
- private key
- secret key
- wireless sensor networks
- multiresolution
- similarity measure