Results 11 to 20 of about 158,618 (286)

ID-based, Proxy, Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała   +3 more
doaj   +1 more source

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]

open access: yes, 2004
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core   +2 more sources

Anonymous Proxy Signatures [PDF]

open access: yes, 2008
We define a general model for consecutive delegations of signing rights with the following properties: The delegatee actually signing and all intermediate delegators remain anonymous. As for group signatures, in case of misuse, a special authority can open signatures to reveal the chain of delegations and the signer's identity.
Fuchsbauer, Georg, Pointcheval, David
openaire   +2 more sources

Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash

open access: yesJournal of Intelligent Systems, 2013
Proxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present.
Bao Haiyong, Cao Zhenfu
doaj   +1 more source

New Lattice-Based Short Proxy Signature Scheme With Fewer System Parameters in the Standard Model

open access: yesIEEE Access, 2022
Proxy signature schemes safely ensure that an original signer transfers the signing right to a proxy signer, and a variety of these schemes have been developed for secure applications.
Zecheng Wang   +4 more
doaj   +1 more source

A Short Linearly Homomorphic Proxy Signature Scheme

open access: yesIEEE Access, 2018
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin   +4 more
doaj   +1 more source

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]

open access: yesJisuanji gongcheng, 2020
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj   +1 more source

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation.
Jiahui Chen   +6 more
doaj   +1 more source

Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

open access: yesEntropy, 2023
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy