Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir BellareChanathip NamprempreGregory NevenPublished in: J. Cryptol. (2009)
Keyphrases
- signature scheme
- identity based signature
- standard model
- digital signature scheme
- public key cryptosystem
- diffie hellman
- private key
- public key
- provably secure
- blind signature
- signcryption scheme
- key distribution
- blind signature scheme
- bilinear pairings
- designated verifier
- digital signature
- security model
- identity based cryptography
- threshold signature scheme
- secret key
- electronic voting
- group signature scheme
- public key cryptography
- encryption scheme
- key management
- security analysis
- proxy signature scheme
- access control
- authentication scheme
- forward secure
- hash functions
- intrusion detection