Signature Schemes Secure against Hard-to-Invert Leakage.
Sebastian FaustCarmit HazayJesper Buus NielsenPeter Sebastian NordholtAngela ZottarelPublished in: ASIACRYPT (2012)
Keyphrases
- signature scheme
- standard model
- digital signature scheme
- identity based signature
- diffie hellman
- digital signature
- key distribution
- blind signature
- private key
- public key
- provably secure
- public key cryptosystem
- threshold signature scheme
- designated verifier
- secret key
- group signature scheme
- security analysis
- ring signature
- key management
- chosen message
- electronic voting
- proxy re encryption
- authentication scheme
- information leakage
- blind signature scheme
- public key cryptography
- cca secure
- authentication protocol
- encryption scheme
- bilinear pairings
- signcryption scheme
- security model
- hash functions