ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure.
Jianhong ZhangPengyan LiZhibin SunJian MaoPublished in: ProvSec (2016)
Keyphrases
- data integrity
- private key
- digital signature
- blind signature
- public key
- secure communication
- signature scheme
- blind signature scheme
- key distribution
- diffie hellman
- database design
- data storage
- distributed databases
- signcryption scheme
- elliptic curve
- database systems
- partially blind signature scheme
- provably secure
- public key cryptography
- secret key
- standard model
- security model
- security analysis
- databases
- client server
- database administrators
- secret sharing scheme
- encryption scheme
- data analysis
- information systems