A Tight Security Reduction Identity-Based Signature Scheme.
Li KangXiaohu TangXianhui LuJia FanPublished in: CIS (2007)
Keyphrases
- signature scheme
- digital signature scheme
- identity based signature
- public key cryptosystem
- standard model
- private key
- diffie hellman assumption
- public key
- diffie hellman
- blind signature
- blind signature scheme
- bilinear pairings
- provably secure
- designated verifier
- key distribution
- security model
- threshold signature scheme
- digital signature
- identity based cryptography
- signcryption scheme
- security analysis
- secret key
- key management
- encryption scheme
- access control
- authentication protocol
- proxy re encryption
- security requirements
- security policies
- network security
- intrusion detection