Results 201 to 210 of about 8,080 (254)

On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature

open access: closed2009 Ninth IEEE International Conference on Computer and Information Technology, 2009
In 1998, Blaze, Bleumer and Strauss proposed new kind of cryptographic primitives called proxy re-encryptionand proxy re-signature. In proxy re-encryption, a proxy cantransform a ciphertext computed under Alice's public key intoone that can be opened under Bob's decryption key. In proxyre-signature, a proxy can transform a signature computed underAlice'
Xu An Wang, Xiaoyuan Yang
openalex   +2 more sources

Provably-Secure Certificateless Proxy Re-signature Scheme

2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
The paper proposes a provably-secure certificateless proxy re-signature scheme. Based certificateless public cryptosystem, it solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme. Analysis shows that the proposed scheme can satisfy the required properties of a proxy re-signature, and it avoids public key
Haiyan Xiao, Minqing Zhang
openaire   +1 more source

ID-based proxy re-signature without pairing

Telecommunication Systems, 2018
Proxy re-signature is a powerful cryptographic primitive, in which a proxy acts as a translator converts Alice’s signature into Bob’s signature by using the re-signature key. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the passed path proof in cloud computing.
Zhiwei Wang, Aidong Xia, Mingjun He
openaire   +1 more source

Proxy Re-signature Supporting Conditional Delegation

2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015
In proxy re-signature (PRS), a signature computed by Alice's secret key can be transferred to be a new signature by a proxy equipped with the re-signature key, while the new signature can be verified by Bob's public key. However, until now all the PRS scheme have this feature: the proxy can transfer all the delegatee's signature to be the delegator's ...
openaire   +2 more sources

Proxy Re-signature Schemes

2008
In a proxy re-signature scheme a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message. In the 12th ACM CCS 2005, Ateniese and Hohenberger presented two secure proxy re-signature schemes based on bilinear maps and left as open challenges the design of multi-use ...
N. R. Sunitha, B. B. Amberker
openaire   +1 more source

Proxy Re-Encryption and Re-Signatures from Lattices

open access: closed, 2019
Proxy re-encryption (PRE) and Proxy re-signature (PRS) were introduced by Blaze, Bleumer and Strauss [Eurocrypt ’98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted under one key into an encryption of the same plaintext under another key, without revealing the underlying plaintext.
Xiong Fan, Feng-Hao Liu
openalex   +2 more sources

Proxy Re-signatures in the Standard Model

2008
This paper studies proxy re-signature schemes. We first classify the expected security notions for proxy re-signature schemes with different properties. We then show how to attack on a recently proposed bidirectional scheme that is purported to be secure without random oracles, and discuss the flaw in their proof.
Sherman S. M. Chow, Raphael C. -W. Phan
openaire   +1 more source

An Efficient Proxy Re-Signature Over Lattices

2019
In 2008, Libert and Vergnaud constructed the first multi-use unidirectional proxy re-signature scheme. In this scheme, the proxy can translate the signatures several times but only in one direction. Thus, two problems remain open. That is, to construct a multi-use unidirectional proxy re-signature scheme based on classical hardness assumptions, and to ...
Mingming Jiang   +4 more
openaire   +1 more source

Threshold proxy re-signature: definition and new constructions

Journal of the Chinese Institute of Engineers, 2018
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations.
Xi Chen   +4 more
openaire   +1 more source

Proxy Re-Signature Scheme from CBS to IBS

Advanced Materials Research, 2011
In 1998, Blaze, Bleumer and Strauss proposed a new kind of cryptographic primitive called proxy re-signature. In proxy re-signature, a proxy can transform a signature computed under Alice’s secret key into one that can be verified by Bob’s public key. In 2005, Ateniese et al proposed a few re-signature schemes and also discussed its several potential ...
Hai Bin Yang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy