Results 1 to 10 of about 138,426 (219)
Some of the next articles are maybe not open access.

ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings

Applied Mathematics and Computation, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Xiangxue, Chen, Kefei
openaire   +1 more source

Proxy re-signatures

Proceedings of the 12th ACM conference on Computer and communications security, 2005
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire   +2 more sources

Quantum Proxy Threshold Multiple Signature Scheme

International Journal of Theoretical Physics, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire   +2 more sources

Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

2007
An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer i signed message mi, where the n signers and n messages are distinct. The main motivation of aggregate signatures is compactness. In this paper, the concept of aggregate proxy signature (APS) is first proposed to compact the proxy signatures ...
Jin Li   +3 more
openaire   +1 more source

A Proxy Partially Blind Signature Scheme with Proxy Revocation

2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010
The constant privilege misuse of the signers is one of the most common problems of the schemes of proxy blind signatures. In 2008, Liu et al. proposed a proxy signature scheme capable of revoking proxy privileges. In this method, the original signer can terminate the proxy privilege at any time without needing to go through a commonly trusted third ...
Fuw-Yi Yang, Ling-Ren Liang
openaire   +1 more source

Leakage-Resilient Proxy Signatures

2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card.
Fei Tang   +3 more
openaire   +1 more source

Deniable Proxy-Anonymous Signatures

2008 The 9th International Conference for Young Computer Scientists, 2008
In this paper, we describe a proxy signature scheme where a signer can delegate his signing right to a party who can then sign on behave of the original signer to generate a proxy signature. Our proxy signature scheme possesses the features of deniability and anonymity.
Chengyu Fan, Shijie Zhou, Fagen Li
openaire   +1 more source

Proxy Signature Schemes

2006 1ST IEEE Conference on Industrial Electronics and Applications, 2006
Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature.
openaire   +1 more source

Proxy signatures, revisited

1997
Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation.
Seungjoo Kim, Sangjoon Park, Dongho Won
openaire   +1 more source

Certificateless proxy multi-signature

Information Sciences, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Du, Hongzhen, Wen, Qiaoyan
openaire   +2 more sources

Home - About - Disclaimer - Privacy