Results 11 to 20 of about 8,080 (254)
SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups
Vehicular Ad hoc Network is an emerging area as a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and confidentiality in the
Sneha Kanchan, Narendra S. Chaudhari
doaj +3 more sources
Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing [PDF]
The Internet of Things (IoT) is the internetworking of terminal physical devices depends on application programming interfaces and sensors to be connected to the Internet for collecting and exchanging data. According to the characteristics of IoT, it can
Jianhong Zhang, Wenle Bai, Yuehai Wang
doaj +2 more sources
Multi-Use Unidirectional Proxy Re-Signatures [PDF]
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive named proxy re-signatures where a proxy turns a signature computed under Alice's secret key into one from Bob on the same message. The semi-trusted proxy does not learn either party's signing key and cannot sign arbitrary messages on behalf of Alice or Bob.
Benôıt Libert, Damien Vergnaud
+7 more sources
Provably secure certificate less blind proxy re-signatures
Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key ...
Tao FENG, Yi-xin LIANG
doaj +3 more sources
ID-Based Bidirectional Threshold Proxy Re-Signature [PDF]
Ying Zhao, Wei Ma
+6 more sources
Partially blind proxy re-signature scheme with proven security
In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially ...
Xiaodong YANG +5 more
doaj +3 more sources
Proxy re-signature scheme based on isomorphisms of polynomial
Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature ...
Hui-xian LI, Lu SHAO, Liao-jun PANG
doaj +3 more sources
Forward-secure unidirectional threshold proxy re-signature [PDF]
Xiaodong Yang, Caifen Wang
openalex +2 more sources
An Efficient Short Blind Proxy Re-signatures Scheme
Abstract The existing proxy re-signature schemes have drawbacks in terms of privacy protection and signature efficiency. Our scheme is based on the proxy re-signature scheme, which combines the main idea of short blind signature and proposes the definition of short blind proxy re-signature scheme.
Xiaodong Yang +4 more
openalex +2 more sources
A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments [PDF]
With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication security and identity privacy of IoT devices must be ensured. However, traditional authentication mechanisms utilized in IoT cannot completely ensure a user’s privacy when his/her messages are routed via an untrusted intermediate device.
Xiaodong Yang +3 more
openalex +4 more sources

