Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Pierre-Louis CayrelPhilippe GaboritEmmanuel ProuffPublished in: CARDIS (2008)
Keyphrases
- signature scheme
- key distribution
- standard model
- digital signature scheme
- private key
- diffie hellman
- public key
- user authentication
- digital signature
- authentication scheme
- identity based signature
- data encryption
- provably secure
- authentication protocol
- key management
- security requirements
- authentication mechanism
- group signature scheme
- security analysis
- security services
- secure communication
- security mechanisms
- secret key
- public key cryptography
- mobile devices
- blind signature
- designated verifier
- threshold signature scheme
- peer to peer