On the Security of Two Fuzzy Identity-Based Signature Schemes.
Syh-Yuan TanSwee-Huay HengBok-Min GoiPublished in: NTMS (2011)
Keyphrases
- signature scheme
- identity based signature
- standard model
- digital signature scheme
- public key cryptosystem
- identity based encryption
- private key
- public key
- diffie hellman
- blind signature
- provably secure
- bilinear pairings
- signcryption scheme
- identity based cryptography
- key distribution
- blind signature scheme
- designated verifier
- security model
- threshold signature scheme
- electronic voting
- digital signature
- encryption scheme
- secret key
- key management
- ring signature
- group signature scheme
- cca secure
- public key cryptography
- information security
- security analysis
- cryptographic protocols
- security properties
- authentication scheme
- low cost
- access control