Results 11 to 20 of about 138,426 (219)

Proxy Confirmation Signatures [PDF]

open access: yesInformatica, 2004
Summary: The undeniable signature, introduced by \textit{D. Chaum} and \textit{H. van Antwerpen} [Lect. Notes Comput. Sci. 435, 212--216 (1990; Zbl 0724.68028)], provides a nice property that the signer has an additional control over who will benefit from being convinced by the signature.
Wang, Chih-Hung, Chen, Yen-Cheng
openaire   +2 more sources

Design and implementation of proxy-protected proxy signature based on SM2

open access: yes网络与信息安全学报, 2017
Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer
Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG   +2 more
doaj   +3 more sources

An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2013
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members.
E. A. Tolyupa
doaj   +3 more sources

ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +1 more source

Certificateless Proxy Signature from RSA [PDF]

open access: yesMathematical Problems in Engineering, 2014
Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context.
Deng, Lunzhi, Zeng, Jiwen, Qu, Yunyun
openaire   +3 more sources

Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations

open access: yesJournal of Advances in Information Technology, 2011
In 1998, Blaze, Bleumer, and Strauss proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message.
N.R. Sunitha, B.B. Amberker
doaj   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

Forward Secure Proxy Signature Scheme over NTRU Lattice [PDF]

open access: yesJisuanji gongcheng, 2019
Most existing forward secure proxy signature schemes are constructed based on traditional number theory problems,such as large integer decomposition,discrete logarithm and bilinear pairs,and they are easy to be cracked in a quantum computing environment ...
YE Qing, YANG Xiaomeng, ZHAO Zongqu, ZHANG Jing
doaj   +1 more source

ID-based, Proxy, Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała   +3 more
doaj   +1 more source

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]

open access: yes, 2004
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core   +2 more sources

Home - About - Disclaimer - Privacy