Applications of undeniable signature schemes.
Kin-Woon YeowSyh-Yuan TanSwee-Huay HengRouzbeh BehniaPublished in: ICSIPA (2015)
Keyphrases
- signature scheme
- digital signature
- standard model
- public key
- threshold signature scheme
- designated verifier
- public key cryptosystem
- digital signature scheme
- provably secure
- group signature scheme
- bilinear pairings
- ring signature
- secret key
- blind signature
- key distribution
- secure communication
- authentication scheme
- blind signature scheme
- forward secure
- security analysis
- hash functions