Results 121 to 130 of about 120,111 (165)
Some of the next articles are maybe not open access.
A certificateless proxy re-signature scheme
2010 3rd International Conference on Computer Science and Information Technology, 2010Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the first certificateless proxy re-signature scheme.
null Guo Duntao +3 more
openaire +1 more source
Provably-Secure Certificateless Proxy Re-signature Scheme
2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013The paper proposes a provably-secure certificateless proxy re-signature scheme. Based certificateless public cryptosystem, it solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme. Analysis shows that the proposed scheme can satisfy the required properties of a proxy re-signature, and it avoids public key
Haiyan Xiao, Minqing Zhang
openaire +1 more source
ID-based proxy re-signature without pairing
Telecommunication Systems, 2018Proxy re-signature is a powerful cryptographic primitive, in which a proxy acts as a translator converts Alice’s signature into Bob’s signature by using the re-signature key. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the passed path proof in cloud computing.
Zhiwei Wang, Aidong Xia, Mingjun He
openaire +1 more source
Proxy Re-signature Supporting Conditional Delegation
2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015In proxy re-signature (PRS), a signature computed by Alice's secret key can be transferred to be a new signature by a proxy equipped with the re-signature key, while the new signature can be verified by Bob's public key. However, until now all the PRS scheme have this feature: the proxy can transfer all the delegatee's signature to be the delegator's ...
openaire +2 more sources
A special purpose proxy re-signature scheme
2012 International Conference on Innovations in Information Technology (IIT), 2012In a proxy re-signature scheme, a semi-trusted entity called proxy is capable of transforming Alice's signature on a message m into Bob's signature on m, with the help of some private information. In this paper, we have addressed the open problem of converting one type of signature into another, this was posed as an interesting issue by Ateniese and ...
S. Sree Vivek +3 more
openaire +1 more source
2008
In a proxy re-signature scheme a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message. In the 12th ACM CCS 2005, Ateniese and Hohenberger presented two secure proxy re-signature schemes based on bilinear maps and left as open challenges the design of multi-use ...
N. R. Sunitha, B. B. Amberker
openaire +1 more source
In a proxy re-signature scheme a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message. In the 12th ACM CCS 2005, Ateniese and Hohenberger presented two secure proxy re-signature schemes based on bilinear maps and left as open challenges the design of multi-use ...
N. R. Sunitha, B. B. Amberker
openaire +1 more source
Proxy Re-signatures in the Standard Model
2008This paper studies proxy re-signature schemes. We first classify the expected security notions for proxy re-signature schemes with different properties. We then show how to attack on a recently proposed bidirectional scheme that is purported to be secure without random oracles, and discuss the flaw in their proof.
Sherman S. M. Chow, Raphael C. -W. Phan
openaire +1 more source
An Efficient Proxy Re-Signature Over Lattices
2019In 2008, Libert and Vergnaud constructed the first multi-use unidirectional proxy re-signature scheme. In this scheme, the proxy can translate the signatures several times but only in one direction. Thus, two problems remain open. That is, to construct a multi-use unidirectional proxy re-signature scheme based on classical hardness assumptions, and to ...
Mingming Jiang +4 more
openaire +1 more source
On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature
2009 Ninth IEEE International Conference on Computer and Information Technology, 2009In 1998, Blaze, Bleumer and Strauss proposed new kind of cryptographic primitives called proxy re-encryptionand proxy re-signature. In proxy re-encryption, a proxy cantransform a ciphertext computed under Alice's public key intoone that can be opened under Bob's decryption key. In proxyre-signature, a proxy can transform a signature computed underAlice'
Xu an Wang, Xiaoyuan Yang
openaire +1 more source
Threshold proxy re-signature: definition and new constructions
Journal of the Chinese Institute of Engineers, 2018The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations.
Xi Chen +4 more
openaire +1 more source

