Revocable identity-based proxy re-signature against signing key exposure. [PDF]
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key.
Xiaodong Yang +4 more
doaj +5 more sources
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei +4 more
doaj +2 more sources
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
In 1998, Blaze, Bleumer, and Strauss proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message.
N.R. Sunitha, B.B. Amberker
doaj +2 more sources
SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups
Vehicular Ad hoc Network is an emerging area as a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and confidentiality in the
Sneha Kanchan, Narendra S. Chaudhari
doaj +2 more sources
Provably secure certificate less blind proxy re-signatures
Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key ...
Tao FENG, Yi-xin LIANG
doaj +3 more sources
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian +3 more
doaj +2 more sources
Partially blind proxy re-signature scheme with proven security
In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially ...
Xiaodong YANG +5 more
doaj +3 more sources
Proxy re-signature scheme based on isomorphisms of polynomial
Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature ...
Hui-xian LI, Lu SHAO, Liao-jun PANG
doaj +3 more sources
Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj +1 more source
Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj +1 more source

