Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption.
Xiao ZhangShengli LiuDawu GuPublished in: ACISP (1) (2017)
Keyphrases
- digital signature
- security issues
- security requirements
- security mechanisms
- signature scheme
- data encryption
- user authentication
- signature verification
- elliptic curve
- standard model
- key management
- database
- highly efficient
- information security
- smart card
- electronic commerce
- operating system
- database systems
- learning algorithm
- neural network