Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations.
Wen-Guey TzengPublished in: Inf. Process. Lett. (1999)
Keyphrases
- chosen message
- public key
- signature scheme
- authentication scheme
- bilinear pairings
- signcryption scheme
- provably secure
- standard model
- public key cryptography
- security analysis
- blind signature scheme
- digital signature
- security model
- private key
- blind signature
- secret key
- diffie hellman
- elliptic curve cryptography
- key management
- secure communication
- authentication protocol
- lightweight