A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms.
Li PingYaping LinPublished in: AINA (2005)
Keyphrases
- cryptographic algorithms
- digital signature
- elliptic curve cryptography
- public key
- security mechanisms
- security analysis
- elliptic curve
- security protocols
- public key infrastructure
- data encryption standard
- public key cryptography
- signature scheme
- smart card
- resource constrained
- security requirements
- key management
- authentication protocol
- security properties
- operating system
- high security
- biometric data
- security model
- security issues
- access control
- security services
- authentication scheme
- provably secure
- blind signature scheme
- diffie hellman
- security systems
- secure communication
- modular exponentiation
- key distribution