Security Analysis and their Improvement of Two Signature Schemes.
Jianhong ZhangJianjun XiePublished in: ICYCS (2008)
Keyphrases
- security analysis
- signature scheme
- public key
- proxy signature scheme
- standard model
- designated verifier
- security model
- encryption scheme
- private key
- digital signature
- blind signature
- smart card
- security properties
- diffie hellman
- secret key
- public key cryptography
- provably secure
- security requirements
- user authentication
- authentication protocol
- blind signature scheme
- ring signature
- forward secure
- authentication scheme
- cost effective
- database systems
- bilinear pairings
- image quality
- distributed systems