Tight Proofs of Identity-based Signatures without Random Oracle.
Huiyan ChenYanshuo ZhangZongjie WanChenchen ZhangPublished in: Int. J. Netw. Secur. (2019)
Keyphrases
- signature scheme
- designated verifier
- bilinear pairings
- lower bound
- upper bound
- public key
- digital signature
- standard model
- theorem prover
- theorem proving
- worst case
- key management
- information systems
- encryption scheme
- generalization error bounds
- data sets
- formal proofs
- automated theorem provers
- blind signature
- key distribution
- decision procedures
- hash functions
- blind signature scheme
- natural deduction
- signature recognition
- public key cryptosystem
- signature verification