Results 211 to 219 of about 138,426 (219)
Some of the next articles are maybe not open access.
Threshold proxy signature schemes
1998Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he ...
openaire +1 more source
Efficient Generic Forward-Secure Signatures and Proxy Signatures
2008We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previously proposed schemes. In particular, the key updating operation in the proposed scheme is orders of magnitude more computationally efficient than previous schemes, making it ...
Basel Alomair +2 more
openaire +1 more source
A proxy-protected proxy signature based on SM9
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), 2021Xiaodong Yang +3 more
openaire +1 more source
A Proxy Blind Signature Scheme with Proxy Revocation
2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), 2007Ji-Hye Park +2 more
openaire +1 more source
A Proxy Multi-Signature Scheme with Proxy Revocation
2009 International Conference on Computational Intelligence and Software Engineering, 2009Xinchun Yin, Funa Ou, Shuying Ye
openaire +1 more source
2024 Twelfth International Symposium on Computing and Networking Workshops (CANDARW)
Mathieu de Goyon, Atsuko Miyaji
openaire +1 more source
Mathieu de Goyon, Atsuko Miyaji
openaire +1 more source
Semiquantum group proxy blind signature
SCIENTIA SINICA Physica, Mechanica & AstronomicaXiao TAN, ZhiGang GAN, TianYu YE
openaire +1 more source

