Security proof of identity-based signature under RSA assumption, reconsidered.
Shogo KimuraKazuki YoneyamaPublished in: ISITA (2016)
Keyphrases
- identity based signature
- signature scheme
- standard model
- identity based cryptography
- public key
- security model
- digital signature scheme
- digital signature
- bilinear pairings
- private key
- public key cryptography
- diffie hellman
- provably secure
- elliptic curve
- key management
- elliptic curve cryptography
- blind signature
- ciphertext
- encryption scheme
- secret key
- ad hoc networks
- key distribution
- blind signature scheme
- information security
- key exchange
- access control
- resource constrained
- fault tolerant