Security Analysis of Lal and Awasthi's Proxy Signature Schemes.
Manik Lal DasAshutosh SaxenaVed Prakash GulatiPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- security analysis
- proxy signature scheme
- signature scheme
- public key
- proxy signature
- original signer
- designated verifier
- proxy signer
- security properties
- bilinear pairings
- private key
- standard model
- security model
- encryption scheme
- security requirements
- smart card
- blind signature
- secret key
- diffie hellman
- blind signature scheme
- forward secure
- user authentication
- secure communication
- digital signature
- elliptic curve
- authentication scheme
- information security