Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security.
Mriganka MandalRamprasad SarkarJunbeom HurKoji NuidaPublished in: ISPEC (2021)
Keyphrases
- public key
- provably secure
- security model
- public key cryptosystem
- security analysis
- private key
- elliptic curve cryptography
- public key encryption scheme
- public key cryptography
- authentication protocol
- diffie hellman
- encryption scheme
- digital signature
- public key infrastructure
- authentication scheme
- blind signature scheme
- secret key
- public key encryption
- secure communication
- signcryption scheme
- blind signature
- message authentication codes
- wireless sensor networks
- elliptic curve
- key management
- standard model
- image authentication
- signature scheme
- hash functions
- information security
- intrusion detection
- cca secure
- security properties