Security analysis of a homomorphic signature scheme for network coding.
Chi ChengTao JiangYining LiuMingwu ZhangPublished in: Secur. Commun. Networks (2015)
Keyphrases
- security analysis
- signature scheme
- public key
- encryption scheme
- standard model
- secret key
- routing algorithm
- diffie hellman
- digital signature
- security model
- wireless networks
- privacy preserving
- designated verifier
- hash functions
- authentication protocol
- provably secure
- proxy signature scheme
- security properties
- public key cryptography
- private key
- authentication scheme
- key distribution
- bilinear pairings
- blind signature scheme
- blind signature
- user authentication
- smart card
- image quality
- image compression
- high dimensional
- signcryption scheme
- database systems
- information systems