The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it.
Jyh-haw YehPublished in: J. Supercomput. (2014)
Keyphrases
- bilinear pairings
- chosen message
- signature scheme
- signcryption scheme
- blind signature scheme
- provably secure
- key management
- public key
- identity based cryptography
- diffie hellman
- blind signature
- public key cryptography
- trusted third party
- standard model
- original signer
- key management scheme
- secret key
- digital images
- digital signature
- electronic voting