Results 211 to 220 of about 8,080 (254)
Some of the next articles are maybe not open access.

A multi-use unidirectional certificateless proxy re-signature scheme

Telecommunication Systems, 2019
Proxy re-signature (PRS) allows a semi-trusted proxy served as a translator to transform a signature of delegatee into a signature of delegator on the same message. The heavy overhead of certificate management and the key escrow problem hinder the development of the public key infrastructure-based PRS scheme and the identity (ID)-based PRS ...
Yan Wu, Hu Xiong, Chuanjie Jin
openaire   +1 more source

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key

2010
In proxy re-signature (PRS), a semi-trusted proxy, with some additional information (a.k.a., re-signature key), can transform Alice's (delegatee) signature into Bob's (delegator) signature on the same message, but cannot produce an arbitrary signature on behalf of either the delegatee or the delegator.
Jun Shao   +4 more
openaire   +1 more source

Identity Based Proxy Re-Signature Schemes without Random Oracle

2009 International Conference on Computational Intelligence and Security, 2009
Based on Gentry’ s identity based encryption, an identity based proxy re-signature scheme is proposed that is existentially unforgeable in the standard model under the q-SDH (Strong Diffie-Hellman) assumption. Comparison with all previous proxy re-signature schemes, the proposed scheme has a tight security reduction and very compact public parameters ...
Xiaoming Hu, Zhe Zhang, Yinchun Yang
openaire   +1 more source

Multi-use unidirectional forward-secure proxy re-signature scheme

2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), 2009
In e-banking, on many occasions, there is need to translate one person's signature to another person's signature with mutual consent. The proxy re-signature scheme proposed by Blaze, Bleumer, and Strauss (BBS) in 1998 addresses this problem. Here, a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a
N.R. Sunitha, B.B. Amberker
openaire   +1 more source

A new forward-secure threshold proxy re-signature scheme

2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009
A forward-secure threshold proxy re-signature scheme in the standard model is firstly proposed in this paper. The scheme has the property that it is infeasible to forge valid proxy re-signatures relating to the past even if more than or equal to the threshold proxies are corrupted. Re-signature keys are updated at regular periods of time.
null Xiaodong Yang   +3 more
openaire   +1 more source

Partial Blind Proxy Re-signature Scheme for Mobile Internet

2020
Aiming at the problems of limited computing power and high security requirements of mobile Internet mobile terminal devices, we propose a server-assisted verification partial blind proxy re-signature scheme. Partial blind proxy re-signature algorithm protects both the trustee’s privacy message and the agent’s legal rights.
Yanfang Lei   +5 more
openaire   +1 more source

Identity-Based Blind Proxy Re-Signature Scheme for Data Security

2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018
Identity-based blind proxy re-signature (IDBPRS) not only has the functionality of signature conversion, but also can protect the privacy of the signed data. In this paper, we present an efficient IDBPRS scheme in the standard model. The proposed scheme is blind and bidirectional, and is proven to be existentially unforgeable under the Diffie-Hellman ...
Xiaodong Yang   +5 more
openaire   +1 more source

Simplified Universally Composable Proxy Re-Signature

Journal of Software, 2010
Xuan HONG, Ke-Fei CHEN, Zhong-Mei WAN
openaire   +1 more source

Home - About - Disclaimer - Privacy