On the Security of Adding Confirmers into Designated Confirmer Signatures.
Wataru SengaHiroshi DoiPublished in: SECRYPT (2009)
Keyphrases
- digital signature
- security analysis
- public key cryptosystem
- security mechanisms
- key management
- public key encryption scheme
- public key
- security requirements
- access control
- smart card
- information security
- blind signature scheme
- security systems
- intrusion detection
- network security
- elliptic curve
- security model
- computer security
- private key
- security problems
- security threats
- trusted third party
- standard model
- signature verification
- authentication protocol
- encryption scheme
- user authentication
- statistical databases
- malicious traffic
- security policies