Digital Signatures with Memory-Tight Security in the Multi-challenge Setting.
Denis DiemertKai GellertTibor JagerLin LyuPublished in: ASIACRYPT (4) (2021)
Keyphrases
- digital signature
- security mechanisms
- key management
- data integrity
- public key
- smart card
- public key cryptography
- security issues
- elliptic curve
- private key
- blind signature
- access control
- security requirements
- blind signature scheme
- trusted third party
- network security
- security analysis
- security model
- information security
- resource constrained
- distributed databases
- wireless sensor networks
- database design
- key distribution
- secret key
- security policies
- security properties
- operating system
- intrusion detection
- computer systems
- data management
- database systems