The security of the code-based signature scheme based on the Stern identification protocol.
Victoria VysotskayaIvan ChizhovPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- signature scheme
- digital signature scheme
- provably secure
- blind signature
- diffie hellman
- public key cryptosystem
- diffie hellman assumption
- key distribution
- fair exchange
- standard model
- blind signature scheme
- public key
- security model
- electronic voting
- key agreement protocol
- identity based signature
- key management
- designated verifier
- private key
- threshold signature scheme
- authentication protocol
- digital signature
- public key cryptography
- bilinear pairings
- access control
- cca secure
- hash functions
- group communication
- forward secure
- security properties
- elliptic curve
- security requirements
- secure communication
- security protocols
- security analysis