Results 1 to 10 of about 158,618 (286)
Identity-Based Proxy Signature with Message Recovery over NTRU Lattice [PDF]
Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications.
Faguo Wu, Bo Zhou, Xiao Zhang
doaj +2 more sources
A Quantum Proxy Signature Scheme Without Restrictions on the Identity and Number of Verifiers [PDF]
Quantum digital signatures (QDS) establish a framework for information-theoretically secure authentication in quantum networks. As a specialized extension of QDS, quantum proxy signatures facilitate secure delegation of signing privileges in distributed ...
Siyu Xiong
doaj +2 more sources
Proxy Confirmation Signatures [PDF]
Summary: The undeniable signature, introduced by \textit{D. Chaum} and \textit{H. van Antwerpen} [Lect. Notes Comput. Sci. 435, 212--216 (1990; Zbl 0724.68028)], provides a nice property that the signer has an additional control over who will benefit from being convinced by the signature.
Wang, Chih-Hung, Chen, Yen-Cheng
openaire +2 more sources
Design and implementation of proxy-protected proxy signature based on SM2
Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer
Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG +2 more
doaj +3 more sources
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj +3 more sources
ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj +1 more source
Certificateless Proxy Signature from RSA [PDF]
Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.
Deng, Lunzhi, Zeng, Jiwen, Qu, Yunyun
openaire +3 more sources
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
In 1998, Blaze, Bleumer, and Strauss proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message.
N.R. Sunitha, B.B. Amberker
doaj +1 more source
Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj +1 more source
Forward Secure Proxy Signature Scheme over NTRU Lattice [PDF]
Most existing forward secure proxy signature schemes are constructed based on traditional number theory problems,such as large integer decomposition,discrete logarithm and bilinear pairs,and they are easy to be cracked in a quantum computing environment ...
YE Qing, YANG Xiaomeng, ZHAO Zongqu, ZHANG Jing
doaj +1 more source

