MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature.
Shaohua TangJiahui ChenLingling XuXiaoyu LiPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- signature scheme
- digital signature scheme
- bilinear pairings
- proxy signature
- private key
- public key cryptosystem
- blind signature
- ring signature scheme
- threshold signature scheme
- designated verifier
- proxy signature scheme
- standard model
- original signer
- diffie hellman
- public key
- blind signature scheme
- ring signature
- provably secure
- identity based signature
- identity based cryptography
- digital signature
- proxy signer
- electronic voting
- group signature scheme
- key distribution
- chosen message
- key management
- proxy re encryption
- security analysis
- security properties
- forward secure
- security model
- signcryption scheme
- access control
- information security
- cca secure
- trusted third party
- secret key
- hash functions