A reduction of security notions in designated confirmer signatures.
Yingjie XiaXuejiao LiuFubiao XiaGuilin WangPublished in: Theor. Comput. Sci. (2016)
Keyphrases
- digital signature
- security analysis
- security mechanisms
- public key cryptosystem
- public key encryption scheme
- key management
- public key
- smart card
- security requirements
- security issues
- security problems
- intrusion detection
- security policies
- statistical databases
- network security
- blind signature scheme
- information security
- security systems
- security model
- authentication protocol
- elliptic curve
- blind signature
- forward secure
- security protocols
- access control
- resource constrained
- signature scheme
- computer security
- encryption scheme
- public key cryptography
- data integrity
- designated verifier
- electronic voting
- trusted third party
- security threats
- signature verification
- database
- database systems