Results 11 to 20 of about 158,618 (286)
ID-based, Proxy, Threshold Signature Scheme [PDF]
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała +3 more
doaj +1 more source
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core +2 more sources
Anonymous Proxy Signatures [PDF]
We define a general model for consecutive delegations of signing rights with the following properties: The delegatee actually signing and all intermediate delegators remain anonymous. As for group signatures, in case of misuse, a special authority can open signatures to reveal the chain of delegations and the signer's identity.
Fuchsbauer, Georg, Pointcheval, David
openaire +2 more sources
Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash
Proxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present.
Bao Haiyong, Cao Zhenfu
doaj +1 more source
New Lattice-Based Short Proxy Signature Scheme With Fewer System Parameters in the Standard Model
Proxy signature schemes safely ensure that an original signer transfers the signing right to a proxy signer, and a variety of these schemes have been developed for secure applications.
Zecheng Wang +4 more
doaj +1 more source
A Short Linearly Homomorphic Proxy Signature Scheme
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin +4 more
doaj +1 more source
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources
Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj +1 more source
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation.
Jiahui Chen +6 more
doaj +1 more source
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li +4 more
doaj +1 more source

