Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios.
Lukasz KrzywieckiMarta SlowikMichal SzalaPublished in: ISPEC (2019)
Keyphrases
- signature scheme
- identity based signature
- standard model
- digital signature scheme
- diffie hellman
- digital signature
- key distribution
- private key
- blind signature
- public key
- identity based cryptography
- provably secure
- public key cryptosystem
- designated verifier
- threshold signature scheme
- security model
- electronic voting
- secret key
- signcryption scheme
- bilinear pairings
- group signature scheme
- secure communication
- blind signature scheme
- chosen message
- group communication
- hash functions
- security analysis
- cca secure
- end to end
- proxy re encryption
- public key cryptography
- access control
- authentication scheme
- ciphertext
- encryption scheme