Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes.
Kyung-Ah ShimPublished in: IEEE Access (2018)
Keyphrases
- security analysis
- public key
- signature scheme
- provably secure
- security model
- proxy signature scheme
- standard model
- private key
- bilinear pairings
- authentication protocol
- public key cryptography
- user authentication
- encryption scheme
- security requirements
- digital signature
- security properties
- smart card
- blind signature
- authentication scheme
- designated verifier
- secret key
- blind signature scheme
- mutual authentication
- key distribution
- original signer
- secure communication
- identity based cryptography
- diffie hellman