On the Joint Security of Encryption and Signature, Revisited.
Kenneth G. PatersonJacob C. N. SchuldtMartijn StamSusan ThomsonPublished in: ASIACRYPT (2011)
Keyphrases
- private key
- digital signature
- encryption algorithms
- security properties
- encryption decryption
- key management
- encryption scheme
- high security
- digital copyright protection
- identity authentication
- public key
- security analysis
- encryption algorithm
- key exchange
- public key cryptography
- data encryption
- security mechanisms
- elliptic curve cryptography
- stream cipher
- smart card
- data confidentiality
- image encryption
- access control
- virtual private network
- public key infrastructure
- secret key
- digital rights management
- blind signature scheme
- intrusion detection
- signature scheme
- ring signature scheme
- blind signature
- cryptographic algorithms
- elliptic curve
- authentication protocol
- data security
- ciphertext
- integrity verification
- network security
- digital watermarking
- security issues
- cryptographic protocols
- trusted third party
- secret sharing scheme
- key distribution
- security policies
- information security
- secure communication
- advanced encryption standard
- security requirements
- mutual authentication
- security protocols
- security services
- authentication scheme
- ad hoc networks