Further Discussions on the Security of a Nominative Signature Scheme.
Lifeng GuoGuilin WangDuncan S. WongPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- identity based signature
- private key
- identity based cryptography
- standard model
- diffie hellman assumption
- provably secure
- diffie hellman
- blind signature scheme
- blind signature
- public key
- threshold signature scheme
- digital signature
- bilinear pairings
- designated verifier
- key distribution
- electronic voting
- security model
- key management
- signcryption scheme
- encryption scheme
- cca secure
- secret key
- ring signature
- cryptographic protocols
- information security
- security analysis
- security requirements
- security policies
- intrusion detection
- network security
- public key cryptography
- authentication scheme
- knn
- data sharing
- security issues