Results 1 to 10 of about 138,426 (219)
Some of the next articles are maybe not open access.
Applied Mathematics and Computation, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Xiangxue, Chen, Kefei
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Xiangxue, Chen, Kefei
openaire +1 more source
Proceedings of the 12th ACM conference on Computer and communications security, 2005
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire +2 more sources
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire +2 more sources
Quantum Proxy Threshold Multiple Signature Scheme
International Journal of Theoretical Physics, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire +2 more sources
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
2007An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer i signed message mi, where the n signers and n messages are distinct. The main motivation of aggregate signatures is compactness. In this paper, the concept of aggregate proxy signature (APS) is first proposed to compact the proxy signatures ...
Jin Li +3 more
openaire +1 more source
A Proxy Partially Blind Signature Scheme with Proxy Revocation
2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010The constant privilege misuse of the signers is one of the most common problems of the schemes of proxy blind signatures. In 2008, Liu et al. proposed a proxy signature scheme capable of revoking proxy privileges. In this method, the original signer can terminate the proxy privilege at any time without needing to go through a commonly trusted third ...
Fuw-Yi Yang, Ling-Ren Liang
openaire +1 more source
Leakage-Resilient Proxy Signatures
2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card.
Fei Tang +3 more
openaire +1 more source
Deniable Proxy-Anonymous Signatures
2008 The 9th International Conference for Young Computer Scientists, 2008In this paper, we describe a proxy signature scheme where a signer can delegate his signing right to a party who can then sign on behave of the original signer to generate a proxy signature. Our proxy signature scheme possesses the features of deniability and anonymity.
Chengyu Fan, Shijie Zhou, Fagen Li
openaire +1 more source
2006 1ST IEEE Conference on Industrial Electronics and Applications, 2006
Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature.
openaire +1 more source
Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature.
openaire +1 more source
1997
Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation.
Seungjoo Kim, Sangjoon Park, Dongho Won
openaire +1 more source
Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation.
Seungjoo Kim, Sangjoon Park, Dongho Won
openaire +1 more source
Certificateless proxy multi-signature
Information Sciences, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Du, Hongzhen, Wen, Qiaoyan
openaire +2 more sources

