Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
Fuchun GuoRongmao ChenWilly SusiloJianchang LaiGuomin YangYi MuPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- optimal solution
- information security
- security issues
- intrusion detection
- security mechanisms
- blind signature scheme
- database
- security measures
- cyber security
- security protocols
- sensitive data
- optimal design
- security policies
- smart card
- access control
- sensor networks
- database systems
- feature selection
- genetic algorithm