Results 1 to 10 of about 120,111 (165)

Revocable identity-based proxy re-signature against signing key exposure. [PDF]

open access: yesPLoS ONE, 2018
Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key.
Xiaodong Yang   +4 more
doaj   +5 more sources

Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme [PDF]

open access: yesSensors
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access ...
Zhanzhen Wei   +4 more
doaj   +2 more sources

Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations

open access: yesJournal of Advances in Information Technology, 2011
In 1998, Blaze, Bleumer, and Strauss proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message.
N.R. Sunitha, B.B. Amberker
doaj   +2 more sources

SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups

open access: yesIEEE Access, 2018
Vehicular Ad hoc Network is an emerging area as a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and confidentiality in the
Sneha Kanchan, Narendra S. Chaudhari
doaj   +2 more sources

Provably secure certificate less blind proxy re-signatures

open access: yesTongxin xuebao, 2012
Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key ...
Tao FENG, Yi-xin LIANG
doaj   +3 more sources

Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

open access: yesIEEE Access, 2018
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian   +3 more
doaj   +2 more sources

Partially blind proxy re-signature scheme with proven security

open access: yesTongxin xuebao, 2018
In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially ...
Xiaodong YANG   +5 more
doaj   +3 more sources

Proxy re-signature scheme based on isomorphisms of polynomial

open access: yesTongxin xuebao, 2017
Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature ...
Hui-xian LI, Lu SHAO, Liao-jun PANG
doaj   +3 more sources

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]

open access: yesJisuanji gongcheng, 2020
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj   +1 more source

Home - About - Disclaimer - Privacy