An Identification Scheme Provably Secure against Reset Attack.
Chan H. LeeXiaotie DengHuafei ZhuPublished in: ICICS (2001)
Keyphrases
- provably secure
- standard model
- diffie hellman assumption
- key management
- blind signature
- security model
- hash functions
- public key
- diffie hellman
- signature scheme
- blind signature scheme
- public key cryptography
- secret key
- bilinear pairings
- encryption scheme
- key distribution
- ciphertext
- partially blind signature scheme
- authentication protocol
- resource constrained
- threshold signature scheme
- elliptic curve
- web services
- security requirements
- embedded systems
- end to end
- wireless sensor networks
- high dimensional