Deniable message transmission authenticator based on weak signature schemes.
Haibo TianPublished in: IET Inf. Secur. (2012)
Keyphrases
- authentication protocol
- signature scheme
- public key
- message transmission
- secret key
- security analysis
- standard model
- threshold signature scheme
- designated verifier
- digital signature
- hash functions
- private key
- authentication scheme
- security model
- provably secure
- group signature scheme
- blind signature
- digital signature scheme
- blind signature scheme
- smart card
- forward secure
- bilinear pairings
- encryption scheme
- trusted third party
- similarity search
- low cost
- query processing