On the security of verifiably encrypted signature schemes in a multi-user setting.
Kyung-Ah ShimPublished in: Ann. des Télécommunications (2014)
Keyphrases
- multi user
- signature scheme
- digital signature scheme
- public key cryptosystem
- standard model
- identity based signature
- diffie hellman
- public key
- private key
- encryption scheme
- provably secure
- blind signature
- bilinear pairings
- blind signature scheme
- virtual world
- virtual environment
- threshold signature scheme
- designated verifier
- multi granularity
- augmented reality
- secret key
- security analysis
- key distribution
- user interface
- identity based cryptography
- digital signature
- security model
- single user
- multiple users
- group signature scheme
- cca secure
- ciphertext
- encryption algorithm
- signcryption scheme
- access control
- intrusion detection
- statistical databases
- electronic voting
- virtual reality
- wireless networks
- high dimensional
- information security
- security policies