Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.
Helena HandschuhDavid NaccachePascal PaillierChristophe TymenPublished in: CARDIS (2002)
Keyphrases
- provably secure
- insider threat
- standard model
- key management
- public key
- blind signature
- hash functions
- security model
- signature scheme
- blind signature scheme
- partially blind signature scheme
- diffie hellman
- bilinear pairings
- wireless sensor networks
- data streams
- threshold signature scheme
- digital signature
- resource constrained
- end to end
- real time