Results 1 to 10 of about 8,080 (254)

Revocable identity-based proxy re-signature against signing key exposure. [PDF]

open access: goldPLoS ONE, 2018
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key.
Xiaodong Yang   +4 more
doaj   +6 more sources

Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]

open access: goldSensors
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei   +4 more
doaj   +4 more sources

Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations

open access: hybridJournal of Advances in Information Technology, 2011
In 1998, Blaze, Bleumer, and Strauss proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message.
N.R. Sunitha, B.B. Amberker
doaj   +3 more sources

Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

open access: goldIEEE Access, 2018
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian   +3 more
doaj   +3 more sources

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: greenJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +2 more sources

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another [PDF]

open access: diamondCybernetics and Information Technologies, 2021
Proxy Re-Signature (PRS) complements well-established digital signature service. Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which ...
Chaudhari Shilpa   +2 more
doaj   +2 more sources

ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]

open access: greenJisuanji gongcheng, 2017
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +2 more sources

Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]

open access: greenJisuanji gongcheng, 2020
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj   +2 more sources

Integrity Verification Scheme for Cloud Data Based on Proxy Re-signature [PDF]

open access: greenJisuanji gongcheng, 2018
A new integrity verification scheme for cloud data is proposed to solve the problems of dynamic data updating and user revocation.The new scheme uses proxy re-signature to transfer data ownership and revoke users.By using the random masking technique,it ...
YANG Xiaodong,LIU Tingting,YANG Ping,AN Faying,XIAO Likun,WANG Caifen
doaj   +2 more sources

E-government Data Security Exchange Scheme Based on Proxy Re-signature [PDF]

open access: greenJisuanji gongcheng, 2017
Considering the security problem of e-government data exchange,a double trapdoor Hash function is proposed by using discrete logarithm assumption.Moreover,this function is proved to satisfy the properties,such as validity,trapdoor collision,collision ...
YANG Xiaodong,GAO Guojuan,ZHOU Qixu,LI Yanan,WANG Caifen
doaj   +2 more sources

Home - About - Disclaimer - Privacy