On Security Notions for Verifiably Encrypted Signature.
Xu An WangXiaoyuan YangQingquan PengPublished in: IAS (2009)
Keyphrases
- encryption decryption
- digital copyright protection
- encryption scheme
- encryption algorithm
- intrusion detection
- encryption key
- blind signature scheme
- information security
- network security
- signature scheme
- access control
- ring signature scheme
- blind signature
- private key
- security problems
- statistical databases
- security policies
- security issues
- digital signature
- security threats
- security requirements
- security level
- signature verification
- security services
- signature recognition
- data security
- data integrity
- public key