Results 251 to 260 of about 158,618 (286)
Some of the next articles are maybe not open access.

Nominative Proxy Ring Signature

2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, 2009
In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. The member of the ring can generate a nominative signature on behalf of the original signer and the ring. In a nominative proxy ring signature scheme, only the nominee can verify the ring signature and if necessary ...
Chengyu Hu, Pengtao Liu, Guoyan Zhang
openaire   +1 more source

Certificateless multi-proxy signature

Computer Communications, 2011
Multi-proxy signature is a scheme that an original signer authorizes a proxy group as his proxy agent and later only the cooperation of all proxy signers in the proxy group could sign messages on behalf of the original signer. To our best knowledge, most of the existing multi-proxy signature schemes are proposed in public key infrastructure or identity-
Zhengping Jin, Qiaoyan Wen
openaire   +1 more source

Certificate-based proxy signature

2010 IEEE International Conference on Progress in Informatics and Computing, 2010
Certificate-based public key cryptography was introduced to remove the use of certificate to ensure the authentication of the user's public key in the traditional cryptography and overcome the key escrow problem in the identity-based public key cryptography.
null Jianneng Chen, null Zhenjie Huang
openaire   +1 more source

An Improved Proxy Blind Signature Scheme

International Journal of Theoretical Physics, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Guo, Xi, Zhang, Jian-Zhong, Xie, Shu-Cui
openaire   +1 more source

Proxy Re-signature Schemes

2008
In a proxy re-signature scheme a semi-trusted proxy acts as a translator between Alice and Bob to translate a signature from Alice into a signature from Bob on the same message. In the 12th ACM CCS 2005, Ateniese and Hohenberger presented two secure proxy re-signature schemes based on bilinear maps and left as open challenges the design of multi-use ...
N. R. Sunitha, B. B. Amberker
openaire   +1 more source

Deniable Partial Proxy Signatures

2004
This paper describes a proxy signature scheme where a signer can delegate a partial signing right to a party who can then sign on behalf of the original signer to generate a partial proxy signature. A partial proxy signature can be converted into a full signature with the aid of the original signer.
Yi Mu, Fangguo Zhang, Willy Susilo
openaire   +1 more source

Controlled Proxy Re-signing - Conditional Proxy Re-Signatures

Proceedings of the 12th International Conference on Security and Cryptography, 2015
Delegation of authentication is one of the vital security management strategies to manage device authentication in an enormous network. Major issue while delegating authentication using traditional proxy cryptography is that the delegator loses control over the messages which are authenticated by the delegatee and in proxy recryptography controlling ...
Guhan Balasubramanian, S. Sree Vivek
openaire   +1 more source

On constructing certificateless proxy signature from certificateless signature

Journal of Shanghai Jiaotong University (Science), 2008
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.
Zhong-mei Wan   +5 more
openaire   +1 more source

Novel Quantum Proxy Signature without Entanglement

International Journal of Theoretical Physics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Threshold proxy signature schemes

1998
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he ...
openaire   +1 more source

Home - About - Disclaimer - Privacy