Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices.
Éric SageloliPierre PébereauPierrick MéauxCéline ChevalierPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- key management
- signature scheme
- signcryption scheme
- bilinear pairings
- identity based cryptography
- encryption scheme
- digital signature
- designated verifier
- public key cryptosystem
- provably secure
- identity based signature
- diffie hellman
- standard model
- key distribution
- public key
- private key
- information security
- upper bound
- blind signature scheme
- security model
- security problems
- network security
- blind signature
- worst case
- statistical databases
- public key cryptography
- intrusion detection
- lower bound
- computer security
- security issues
- objective function
- malware detection
- signature verification
- data security
- cyber security
- security protocols
- secret key
- security requirements
- security services
- security properties
- secret sharing scheme
- resource constrained
- forward secure
- anomaly detection
- information systems
- authentication and key agreement