Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
From MaRDI portal
Publication:4933209
DOI10.1007/978-3-642-16280-0_2zbMath1286.94057OpenAlexW1484847234MaRDI QIDQ4933209
Publication date: 12 October 2010
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-16280-0_2
tight reductionidentification schemeconcurrent man-in-the-middle attackgap computational Diffie-Hellman assumption
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient signature generation by smart cards
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Extractable Perfectly One-Way Functions
- Foundations of Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- An efficient and secure two-flow zero-knowledge identification protocol
- Theory of Cryptography
This page was built for publication: Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks