Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress.
Przemyslaw BlaskiewiczPrzemyslaw KubiakMiroslaw KutylowskiPublished in: INTRUST (2010)
Keyphrases
- private key
- key distribution
- blind signature
- lightweight
- authentication protocol
- security analysis
- security protocols
- secret key
- real time
- blind signature scheme
- signature verification
- smart card
- group communication
- digital signature
- signature scheme
- cryptographic protocols
- signature recognition
- electronic voting
- coloured petri nets
- digital copyright protection
- file transfer
- session key
- key agreement protocol
- communication protocols