Results 211 to 220 of about 8,080 (254)
Some of the next articles are maybe not open access.
A multi-use unidirectional certificateless proxy re-signature scheme
Telecommunication Systems, 2019Proxy re-signature (PRS) allows a semi-trusted proxy served as a translator to transform a signature of delegatee into a signature of delegator on the same message. The heavy overhead of certificate management and the key escrow problem hinder the development of the public key infrastructure-based PRS scheme and the identity (ID)-based PRS ...
Yan Wu, Hu Xiong, Chuanjie Jin
openaire +1 more source
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
2010In proxy re-signature (PRS), a semi-trusted proxy, with some additional information (a.k.a., re-signature key), can transform Alice's (delegatee) signature into Bob's (delegator) signature on the same message, but cannot produce an arbitrary signature on behalf of either the delegatee or the delegator.
Jun Shao +4 more
openaire +1 more source
Identity Based Proxy Re-Signature Schemes without Random Oracle
2009 International Conference on Computational Intelligence and Security, 2009Based on Gentry’ s identity based encryption, an identity based proxy re-signature scheme is proposed that is existentially unforgeable in the standard model under the q-SDH (Strong Diffie-Hellman) assumption. Comparison with all previous proxy re-signature schemes, the proposed scheme has a tight security reduction and very compact public parameters ...
Xiaoming Hu, Zhe Zhang, Yinchun Yang
openaire +1 more source
Multi-use unidirectional forward-secure proxy re-signature scheme
2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), 2009In e-banking, on many occasions, there is need to translate one person's signature to another person's signature with mutual consent. The proxy re-signature scheme proposed by Blaze, Bleumer, and Strauss (BBS) in 1998 addresses this problem. Here, a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a
N.R. Sunitha, B.B. Amberker
openaire +1 more source
A new forward-secure threshold proxy re-signature scheme
2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009A forward-secure threshold proxy re-signature scheme in the standard model is firstly proposed in this paper. The scheme has the property that it is infeasible to forge valid proxy re-signatures relating to the past even if more than or equal to the threshold proxies are corrupted. Re-signature keys are updated at regular periods of time.
null Xiaodong Yang +3 more
openaire +1 more source
Partial Blind Proxy Re-signature Scheme for Mobile Internet
2020Aiming at the problems of limited computing power and high security requirements of mobile Internet mobile terminal devices, we propose a server-assisted verification partial blind proxy re-signature scheme. Partial blind proxy re-signature algorithm protects both the trustee’s privacy message and the agent’s legal rights.
Yanfang Lei +5 more
openaire +1 more source
Identity-Based Blind Proxy Re-Signature Scheme for Data Security
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018Identity-based blind proxy re-signature (IDBPRS) not only has the functionality of signature conversion, but also can protect the privacy of the signed data. In this paper, we present an efficient IDBPRS scheme in the standard model. The proposed scheme is blind and bidirectional, and is proven to be existentially unforgeable under the Diffie-Hellman ...
Xiaodong Yang +5 more
openaire +1 more source
Electricity carbon quota trading scheme based on blockchain and proxy re-signature
Jun Wei +4 more
openalex +1 more source
Simplified Universally Composable Proxy Re-Signature
Journal of Software, 2010Xuan HONG, Ke-Fei CHEN, Zhong-Mei WAN
openaire +1 more source

