On the security models for certificateless signature schemes achieving level 3 security.
Yu-Chi ChenGwoboa HorngPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- provably secure
- blind signature
- private key
- blind signature scheme
- identity based signature
- public key
- security model
- diffie hellman
- standard model
- diffie hellman assumption
- bilinear pairings
- designated verifier
- threshold signature scheme
- group signature scheme
- intrusion detection
- access control
- information security
- network security
- key management
- key distribution
- identity based cryptography
- security policies
- electronic voting
- security requirements
- security issues
- digital signature
- encryption scheme
- secret key
- security analysis
- secure communication
- elliptic curve
- security properties