Stronger Security for Non-Interactive Threshold Signatures: BLS and FROST.
Mihir BellareStefano TessaroChenzhi ZhuPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- information security
- access control
- security issues
- security systems
- security requirements
- network security
- user interaction
- intrusion detection
- signcryption scheme
- computer security
- database
- security mechanisms
- security protocols
- virtual reality
- security policies
- video sequences
- security management
- security problems
- data security
- security level
- designated verifier
- standard model
- key management
- functional requirements
- sensitive data
- computer networks