Results 231 to 240 of about 158,618 (286)
Some of the next articles are maybe not open access.

An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature

2008 International Conference on Information Technology, 2008
Identity-based (ID based) public key cryptosystem gives an efficient alternative for key management as compared to certificate based public key settings. A proxy signature is a method for an entity to delegate signing capabilities to other participants so that they can sign on behalf of the entity with in a given context.
Banshidhar Majhi   +2 more
openaire   +1 more source

Threshold Proxy Re-Signature

2008 IEEE International Performance, Computing and Communications Conference, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Piyi, Cao, Zhenfu, Dong, Xiaolei
openaire   +2 more sources

Proxy group signature: A new anonymous proxy signature scheme

2008 International Conference on Machine Learning and Cybernetics, 2008
In the proxy signature scheme, the capability of anonymous proxy is requested for protecting the proxy signerpsilas privacy. This paper introduces a concept and model of proxy group signature and constructs a proxy group signature scheme based on bilinear pairings.
null Ke-Li Wu   +3 more
openaire   +1 more source

Ring proxy signatures

Journal of Electronics (China), 2008
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an ...
Baodian Wei   +2 more
openaire   +1 more source

Threshold proxy signatures

IEE Proceedings - Computers and Digital Techniques, 1999
A (t, n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. The authors review both Zhang's threshold proxy signature scheme and Kim's threshold proxy signature scheme.
H. -M. Sun, N. -Y. Lee, T. Hwang
openaire   +1 more source

Proxy-protected signature secure against the undelegated proxy signature attack

Computers & Electrical Engineering, 2007
The proxy signature scheme enables an original signer to delegate his/her signing capability to a designated proxy signer, thereby the proxy signer can sign messages on behalf of the original signer. Recently, Zhou et al. proposed two proxy-protected signature schemes.
Yu-Chuan Liu   +3 more
openaire   +1 more source

Efficient Certificateless Proxy Signature Scheme

International Journal of Foundations of Computer Science, 2016
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is ...
Deng, Lunzhi, Zeng, Jiwen, Huang, Huawei
openaire   +1 more source

ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings

Applied Mathematics and Computation, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Xiangxue, Chen, Kefei
openaire   +1 more source

Proxy re-signatures

Proceedings of the 12th ACM conference on Computer and communications security, 2005
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from Bob on the same message.
ATENIESE, GIUSEPPE, Susan Hohenberger
openaire   +2 more sources

Home - About - Disclaimer - Privacy