Security Proofs for the BLT Signature Scheme.
Ahto BuldasRisto LaanojaAhto TruuPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- signature scheme
- digital signature scheme
- public key cryptosystem
- identity based signature
- standard model
- diffie hellman
- private key
- public key
- provably secure
- blind signature scheme
- blind signature
- diffuse optical tomography
- bilinear pairings
- designated verifier
- key distribution
- digital signature
- key management
- finite element method
- security model
- threshold signature scheme
- identity based cryptography
- partially blind signature scheme
- information security
- public key cryptography
- access control
- security requirements
- encryption scheme
- security analysis
- security issues
- elliptic curve
- cca secure
- security protocols
- network security
- cryptographic protocols
- intrusion detection