Results 191 to 200 of about 8,080 (254)

Revised oceanic molybdenum isotope budget from deep-sea pelagic sediments. [PDF]

open access: yesNat Commun
Wang Z   +7 more
europepmc   +1 more source

Threshold Proxy Re-Signature

open access: closed2008 IEEE International Performance, Computing and Communications Conference, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Piyi Yang, Zhenfu Cao, Xiaolei Dong
openalex   +3 more sources

Server-Aided Verification Proxy Re-signature

open access: closed2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the proof of passed path in cloud computing.
Zhiwei Wang, Wei Lv
openalex   +2 more sources

Improved bidirectional blind proxy re-signature scheme

open access: closedJournal of Computer Applications, 2013
Xihe Li, Xiaodong Yang
  +4 more sources

Proxy re-signatures

Proceedings of the 12th ACM conference on Computer and communications security, 2005
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire   +2 more sources

Proxy Re-signature Schemes Without Random Oracles [PDF]

open access: closed, 2007
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005.
Jun Shao   +3 more
openalex   +2 more sources

A special purpose proxy re-signature scheme

open access: closed2012 International Conference on Innovations in Information Technology (IIT), 2012
In a proxy re-signature scheme, a semi-trusted entity called proxy is capable of transforming Alice's signature on a message m into Bob's signature on m, with the help of some private information. In this paper, we have addressed the open problem of converting one type of signature into another, this was posed as an interesting issue by Ateniese and ...
S. Sree Vivek   +3 more
openalex   +2 more sources

Unidirectional Identity-Based Proxy Re-Signature

2011 IEEE International Conference on Communications (ICC), 2011
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only a few schemes. None of these schemes is unidirectional identity-based proxy re-signature, where a semi-trusted proxy can transform a signature under an identity to another signature under another identity on the same message, while the proxy ...
Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
openaire   +1 more source

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key

Journal of Computer and System Sciences, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Wenbin   +5 more
openaire   +2 more sources

A certificateless proxy re-signature scheme

2010 3rd International Conference on Computer Science and Information Technology, 2010
Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the first certificateless proxy re-signature scheme.
null Guo Duntao   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy