On the Security of Two-Round Multi-Signatures.
Manu DrijversKasra EdalatnejadBryan FordEike KiltzJulian LossGregory NevenIgors StepanovsPublished in: IEEE Symposium on Security and Privacy (2019)
Keyphrases
- information security
- access control
- factor authentication
- intrusion detection
- signature verification
- security requirements
- network security
- security threats
- computer security
- security policies
- functional requirements
- data security
- security model
- security systems
- information assurance
- security issues
- key management
- biometric systems
- statistical databases
- digital signature
- security management
- security vulnerabilities
- designated verifier
- public key cryptosystem
- social networks