Wu, Chien-Nan; Fan, Chun-I; Huang, Jheng-Jia; Tseng, Yi-Fan - In: International Journal of Software Innovation (IJSI) 6 (2018) 3, pp. 18-35
inefficient authentication during the stage of proving credential possession. To overcome this drawback, this article presents a … achieve efficient authentication. In addition to providing a computational cost comparison table showing that the proposed … signature scheme achieves a more efficient credential possession proving compared to other schemes, concrete security proofs are …