Login / Signup
Using the RSA or RSA-B accumulator in anonymous credential schemes.
Sietse Ringers
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
digital signature scheme
public key
signature scheme
public key cryptography
key exchange
modular exponentiation
hough transform
database
access control
elliptic curve
private key
provably secure
case study
database systems
multiscale
image processing
digital signature
information systems
data mining