Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection.
Amit K. AwasthiPublished in: Int. J. Inf. Comput. Secur. (2010)
Keyphrases
- original signer
- privacy protection
- trusted third party
- proxy signature scheme
- proxy signer
- proxy signature
- individual privacy
- security analysis
- statistical databases
- designated verifier
- security properties
- security requirements
- sensitive data
- forward secure
- data collection
- privacy preserving
- third party
- information loss
- bilinear pairings
- data sharing
- security services
- private information
- credit card
- authentication protocol
- digital signature
- private key
- sensitive information
- blind signature scheme
- privacy preservation
- security protocols
- key management
- signature scheme
- data publishing
- diffie hellman
- personal information
- fault tolerant
- information security
- public key