Results 1 to 10 of about 158,618 (286)

Identity-Based Proxy Signature with Message Recovery over NTRU Lattice [PDF]

open access: yesEntropy, 2023
Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications.
Faguo Wu, Bo Zhou, Xiao Zhang
doaj   +2 more sources

A Quantum Proxy Signature Scheme Without Restrictions on the Identity and Number of Verifiers [PDF]

open access: yesEntropy
Quantum digital signatures (QDS) establish a framework for information-theoretically secure authentication in quantum networks. As a specialized extension of QDS, quantum proxy signatures facilitate secure delegation of signing privileges in distributed ...
Siyu Xiong
doaj   +2 more sources

Proxy Confirmation Signatures [PDF]

open access: yesInformatica, 2004
Summary: The undeniable signature, introduced by \textit{D. Chaum} and \textit{H. van Antwerpen} [Lect. Notes Comput. Sci. 435, 212--216 (1990; Zbl 0724.68028)], provides a nice property that the signer has an additional control over who will benefit from being convinced by the signature.
Wang, Chih-Hung, Chen, Yen-Cheng
openaire   +2 more sources

Design and implementation of proxy-protected proxy signature based on SM2

open access: yes网络与信息安全学报, 2017
Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer
Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG   +2 more
doaj   +3 more sources

An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2013
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj   +3 more sources

ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +1 more source

Certificateless Proxy Signature from RSA [PDF]

open access: yesMathematical Problems in Engineering, 2014
Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.
Deng, Lunzhi, Zeng, Jiwen, Qu, Yunyun
openaire   +3 more sources

Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations

open access: yesJournal of Advances in Information Technology, 2011
In 1998, Blaze, Bleumer, and Strauss proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message.
N.R. Sunitha, B.B. Amberker
doaj   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

Forward Secure Proxy Signature Scheme over NTRU Lattice [PDF]

open access: yesJisuanji gongcheng, 2019
Most existing forward secure proxy signature schemes are constructed based on traditional number theory problems,such as large integer decomposition,discrete logarithm and bilinear pairs,and they are easy to be cracked in a quantum computing environment ...
YE Qing, YANG Xiaomeng, ZHAO Zongqu, ZHANG Jing
doaj   +1 more source

Home - About - Disclaimer - Privacy