Security Analysis of Signature Schemes with Key Blinding.
Edward EatonTancrède LepointChristopher A. WoodPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- security analysis
- signature scheme
- public key
- private key
- high security
- proxy signature scheme
- standard model
- security model
- designated verifier
- secure communication
- encryption scheme
- proxy signature
- provably secure
- secret key
- security properties
- smart card
- authentication scheme
- blind signature
- security requirements
- key distribution
- diffie hellman
- authentication protocol
- digital signature
- user authentication
- public key cryptography
- blind signature scheme
- proxy signer
- ring signature
- forward secure