Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem.
Ying WuYongping ZhangTianjie CaoPublished in: Security and Management (2005)
Keyphrases
- proxy signature scheme
- elliptic curve
- security analysis
- original signer
- proxy signature
- proxy signer
- scalar multiplication
- elliptic curve cryptography
- public key
- security requirements
- digital signature
- smart card
- security model
- diffie hellman
- encryption algorithm
- designated verifier
- security properties
- image encryption
- public key cryptography
- authentication protocol
- encryption scheme
- user authentication
- forward secure
- efficient computation
- authentication scheme
- similarity search