An attack on the certificateless signature scheme from EUC Workshops 2006.
Je Hong ParkPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- signature scheme
- end user computing
- secret key
- chosen message
- public key
- standard model
- designated verifier
- management information systems
- information systems
- bilinear pairings
- authentication protocol
- threshold signature scheme
- digital signature
- provably secure
- ciphertext
- diffie hellman
- digital signature scheme
- group signature scheme
- blind signature
- information technology
- authentication scheme
- secure communication
- public key cryptosystem
- similarity measure
- key distribution
- forward secure
- private key
- key management
- network security