A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
Ghada ArfaouiPierre-Alain FouqueThibaut JacquesPascal LafourcadeAdina NedelcuCristina OneteLéo RobertPublished in: ACNS (2022)
Keyphrases
- provably secure
- key management
- hash functions
- public key cryptography
- public key
- standard model
- encryption scheme
- ad hoc networks
- blind signature
- security model
- resource constrained
- digital signature
- partially blind signature scheme
- secret sharing scheme
- security protocols
- signature scheme
- cryptographic protocols
- security analysis
- smart card