Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.
Denis DiemertKai GellertTibor JagerLin LyuPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- digital signature
- security mechanisms
- key management
- data integrity
- elliptic curve
- security issues
- smart card
- public key cryptography
- private key
- public key
- blind signature
- blind signature scheme
- network security
- access control
- information security
- trusted third party
- security requirements
- key distribution
- security analysis
- distributed databases
- database
- intrusion detection
- operating system
- database design
- resource constrained
- provably secure
- security policies
- security model
- digital watermarking
- security protocols
- database applications
- ad hoc networks
- encryption scheme