Further Discussions on the Security of a Nominative Signature Scheme.
Lifeng GuoGuilin WangDuncan S. WongLei HuPublished in: Security and Management (2007)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- diffie hellman
- identity based signature
- private key
- public key
- diffie hellman assumption
- standard model
- provably secure
- blind signature scheme
- blind signature
- security model
- designated verifier
- digital signature
- key distribution
- threshold signature scheme
- identity based cryptography
- electronic voting
- security analysis
- bilinear pairings
- ring signature
- signcryption scheme
- access control
- information security
- intrusion detection
- security requirements
- secure communication
- key management
- encryption scheme
- secret key
- network security
- data integrity