Machine-Checked Security Proofs of Cryptographic Signature Schemes.
Sabrina TarentoPublished in: ESORICS (2005)
Keyphrases
- signature scheme
- digital signature scheme
- standard model
- encryption scheme
- digital signature
- public key cryptosystem
- public key
- identity based signature
- provably secure
- public key cryptography
- key management
- hash functions
- diffie hellman
- blind signature
- private key
- secure communication
- secret key
- identity based cryptography
- security protocols
- blind signature scheme
- cryptographic protocols
- key distribution
- designated verifier
- security properties
- smart card
- security analysis
- threshold signature scheme
- information security
- security model
- signcryption scheme
- electronic voting
- bilinear pairings
- group signature scheme
- trusted third party
- security requirements
- security issues
- cca secure
- access control
- statistical databases
- authentication protocol
- security policies
- similarity measure
- proxy re encryption
- network security
- security mechanisms