Security Enhancements by OR-Proof in Identity-Based Identification.
Atsushi FujiokaTaiichi SaitoKeita XagawaPublished in: ACNS (2012)
Keyphrases
- key management
- signcryption scheme
- encryption scheme
- access control
- identity based cryptography
- key distribution
- authentication and key agreement
- blind signature scheme
- intrusion detection
- information security
- public key
- security policies
- security issues
- standard model
- security requirements
- linear logic
- bilinear pairings
- provably secure
- security analysis
- computer security
- security problems
- functional requirements
- security services
- security measures
- security systems
- signature scheme
- data security
- public key cryptosystem
- secret key