Results 241 to 250 of about 158,618 (286)
Some of the next articles are maybe not open access.
Quantum Proxy Threshold Multiple Signature Scheme
International Journal of Theoretical Physics, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire +2 more sources
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
2007An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer i signed message mi, where the n signers and n messages are distinct. The main motivation of aggregate signatures is compactness. In this paper, the concept of aggregate proxy signature (APS) is first proposed to compact the proxy signatures ...
Jin Li +3 more
openaire +1 more source
A Proxy Partially Blind Signature Scheme with Proxy Revocation
2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010The constant privilege misuse of the signers is one of the most common problems of the schemes of proxy blind signatures. In 2008, Liu et al. proposed a proxy signature scheme capable of revoking proxy privileges. In this method, the original signer can terminate the proxy privilege at any time without needing to go through a commonly trusted third ...
Fuw-Yi Yang, Ling-Ren Liang
openaire +1 more source
Leakage-Resilient Proxy Signatures
2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card.
Fei Tang +3 more
openaire +1 more source
Deniable Proxy-Anonymous Signatures
2008 The 9th International Conference for Young Computer Scientists, 2008In this paper, we describe a proxy signature scheme where a signer can delegate his signing right to a party who can then sign on behave of the original signer to generate a proxy signature. Our proxy signature scheme possesses the features of deniability and anonymity.
Chengyu Fan, Shijie Zhou, Fagen Li
openaire +1 more source
2006 1ST IEEE Conference on Industrial Electronics and Applications, 2006
Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature.
openaire +1 more source
Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature.
openaire +1 more source
1997
Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation.
Seungjoo Kim, Sangjoon Park, Dongho Won
openaire +1 more source
Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation.
Seungjoo Kim, Sangjoon Park, Dongho Won
openaire +1 more source
Certificateless proxy multi-signature
Information Sciences, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Du, Hongzhen, Wen, Qiaoyan
openaire +2 more sources
2010 International Conference on Computational Intelligence and Security, 2010
Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can’t resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum attack.
Yali Jiang, Fanyu Kong, Xiuling Ju
openaire +1 more source
Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can’t resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum attack.
Yali Jiang, Fanyu Kong, Xiuling Ju
openaire +1 more source
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings
2004In electronic world, proxy signature is a solution of delegation of signing capabilities. Proxy signatures can combine other special signatures to obtain some new types of proxy signatures. Due to the various applications of the bilinear pairings in cryptography, many pairing-based signature schemes have been proposed. In this paper, we propose a multi-
Xiangxue Li, Kefei Chen, Shiqun Li
openaire +1 more source

