Results 201 to 210 of about 8,080 (254)
On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature
In 1998, Blaze, Bleumer and Strauss proposed new kind of cryptographic primitives called proxy re-encryptionand proxy re-signature. In proxy re-encryption, a proxy cantransform a ciphertext computed under Alice's public key intoone that can be opened under Bob's decryption key. In proxyre-signature, a proxy can transform a signature computed underAlice'
Xu An Wang, Xiaoyuan Yang
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Provably-Secure Certificateless Proxy Re-signature Scheme
2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013The paper proposes a provably-secure certificateless proxy re-signature scheme. Based certificateless public cryptosystem, it solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme. Analysis shows that the proposed scheme can satisfy the required properties of a proxy re-signature, and it avoids public key
Haiyan Xiao, Minqing Zhang
openaire +1 more source
ID-based proxy re-signature without pairing
Telecommunication Systems, 2018Proxy re-signature is a powerful cryptographic primitive, in which a proxy acts as a translator converts Alice’s signature into Bob’s signature by using the re-signature key. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the passed path proof in cloud computing.
Zhiwei Wang, Aidong Xia, Mingjun He
openaire +1 more source
Proxy Re-signature Supporting Conditional Delegation
2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015In proxy re-signature (PRS), a signature computed by Alice's secret key can be transferred to be a new signature by a proxy equipped with the re-signature key, while the new signature can be verified by Bob's public key. However, until now all the PRS scheme have this feature: the proxy can transfer all the delegatee's signature to be the delegator's ...
openaire +2 more sources
2008
In a proxy re-signature scheme a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message. In the 12th ACM CCS 2005, Ateniese and Hohenberger presented two secure proxy re-signature schemes based on bilinear maps and left as open challenges the design of multi-use ...
N. R. Sunitha, B. B. Amberker
openaire +1 more source
In a proxy re-signature scheme a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message. In the 12th ACM CCS 2005, Ateniese and Hohenberger presented two secure proxy re-signature schemes based on bilinear maps and left as open challenges the design of multi-use ...
N. R. Sunitha, B. B. Amberker
openaire +1 more source
Proxy Re-Encryption and Re-Signatures from Lattices
Proxy re-encryption (PRE) and Proxy re-signature (PRS) were introduced by Blaze, Bleumer and Strauss [Eurocrypt ’98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted under one key into an encryption of the same plaintext under another key, without revealing the underlying plaintext.
Xiong Fan, Feng-Hao Liu
openalex +2 more sources
Proxy Re-signatures in the Standard Model
2008This paper studies proxy re-signature schemes. We first classify the expected security notions for proxy re-signature schemes with different properties. We then show how to attack on a recently proposed bidirectional scheme that is purported to be secure without random oracles, and discuss the flaw in their proof.
Sherman S. M. Chow, Raphael C. -W. Phan
openaire +1 more source
An Efficient Proxy Re-Signature Over Lattices
2019In 2008, Libert and Vergnaud constructed the first multi-use unidirectional proxy re-signature scheme. In this scheme, the proxy can translate the signatures several times but only in one direction. Thus, two problems remain open. That is, to construct a multi-use unidirectional proxy re-signature scheme based on classical hardness assumptions, and to ...
Mingming Jiang +4 more
openaire +1 more source
Threshold proxy re-signature: definition and new constructions
Journal of the Chinese Institute of Engineers, 2018The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations.
Xi Chen +4 more
openaire +1 more source
Proxy Re-Signature Scheme from CBS to IBS
Advanced Materials Research, 2011In 1998, Blaze, Bleumer and Strauss proposed a new kind of cryptographic primitive called proxy re-signature. In proxy re-signature, a proxy can transform a signature computed under Alice’s secret key into one that can be verified by Bob’s public key. In 2005, Ateniese et al proposed a few re-signature schemes and also discussed its several potential ...
Hai Bin Yang +3 more
openaire +1 more source

