A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
Ghada ArfaouiPierre-Alain FouqueThibaut JacquesPascal LafourcadeAdina NedelcuCristina OneteLéo RobertPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- provably secure
- key management
- hash functions
- public key cryptography
- blind signature
- digital signature
- encryption scheme
- blind signature scheme
- signature scheme
- public key
- standard model
- partially blind signature scheme
- security model
- resource constrained
- ad hoc networks
- secure communication
- trusted third party
- wireless sensor networks
- security protocols
- smart card
- secret sharing scheme
- similarity search