Results 11 to 20 of about 138,426 (219)
Proxy Confirmation Signatures [PDF]
Summary: The undeniable signature, introduced by \textit{D. Chaum} and \textit{H. van Antwerpen} [Lect. Notes Comput. Sci. 435, 212--216 (1990; Zbl 0724.68028)], provides a nice property that the signer has an additional control over who will benefit from being convinced by the signature.
Wang, Chih-Hung, Chen, Yen-Cheng
openaire +2 more sources
Design and implementation of proxy-protected proxy signature based on SM2
Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer
Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG +2 more
doaj +3 more sources
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj +3 more sources
ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj +1 more source
Certificateless Proxy Signature from RSA [PDF]
Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.
Deng, Lunzhi, Zeng, Jiwen, Qu, Yunyun
openaire +3 more sources
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
In 1998, Blaze, Bleumer, and Strauss proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message.
N.R. Sunitha, B.B. Amberker
doaj +1 more source
Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj +1 more source
Forward Secure Proxy Signature Scheme over NTRU Lattice [PDF]
Most existing forward secure proxy signature schemes are constructed based on traditional number theory problems,such as large integer decomposition,discrete logarithm and bilinear pairs,and they are easy to be cracked in a quantum computing environment ...
YE Qing, YANG Xiaomeng, ZHAO Zongqu, ZHANG Jing
doaj +1 more source
ID-based, Proxy, Threshold Signature Scheme [PDF]
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała +3 more
doaj +1 more source
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core +2 more sources

