Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T.
Mahmoud YehiaRiham AlTawyT. Aaron GulliverPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- security analysis
- signature scheme
- public key
- proxy signature scheme
- designated verifier
- standard model
- security model
- encryption scheme
- secret key
- digital signature
- smart card
- security properties
- private key
- security requirements
- group signature scheme
- provably secure
- diffie hellman
- authentication protocol
- key distribution
- blind signature
- user authentication
- public key cryptography
- blind signature scheme
- proxy signature
- intrusion detection
- lightweight
- authentication scheme
- software engineering
- signcryption scheme
- original signer
- hash functions