Results 191 to 200 of about 8,080 (254)
Revised oceanic molybdenum isotope budget from deep-sea pelagic sediments. [PDF]
Wang Z +7 more
europepmc +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Piyi Yang, Zhenfu Cao, Xiaolei Dong
openalex +3 more sources
Server-Aided Verification Proxy Re-signature
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the proof of passed path in cloud computing.
Zhiwei Wang, Wei Lv
openalex +2 more sources
Improved bidirectional blind proxy re-signature scheme
Xihe Li, Xiaodong Yang
+4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 12th ACM conference on Computer and communications security, 2005
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire +2 more sources
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire +2 more sources
Proxy Re-signature Schemes Without Random Oracles [PDF]
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005.
Jun Shao +3 more
openalex +2 more sources
A special purpose proxy re-signature scheme
In a proxy re-signature scheme, a semi-trusted entity called proxy is capable of transforming Alice's signature on a message m into Bob's signature on m, with the help of some private information. In this paper, we have addressed the open problem of converting one type of signature into another, this was posed as an interesting issue by Ateniese and ...
S. Sree Vivek +3 more
openalex +2 more sources
Unidirectional Identity-Based Proxy Re-Signature
2011 IEEE International Conference on Communications (ICC), 2011To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only a few schemes. None of these schemes is unidirectional identity-based proxy re-signature, where a semi-trusted proxy can transform a signature under an identity to another signature under another identity on the same message, while the proxy ...
Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
openaire +1 more source
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
Journal of Computer and System Sciences, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Wenbin +5 more
openaire +2 more sources
A certificateless proxy re-signature scheme
2010 3rd International Conference on Computer Science and Information Technology, 2010Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the first certificateless proxy re-signature scheme.
null Guo Duntao +3 more
openaire +1 more source

