Secure Generation of Digital Signature on Compromised Computer.
Hideaki TanakaShoichi SasakiIsao EchizenHiroshi YoshiuraPublished in: IIH-MSP (2007)
Keyphrases
- digital signature
- key management
- public key
- smart card
- security mechanisms
- public key cryptosystem
- elliptic curve
- secure communication
- public key infrastructure
- private key
- signature scheme
- data integrity
- blind signature scheme
- digital watermarking
- diffie hellman
- public key cryptography
- ad hoc networks
- digital copyright protection
- database
- security model
- resource constrained
- security requirements
- data storage
- network security
- distributed databases
- operating system
- multimedia
- databases