Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation
We present a scheme for teleporting an unknown, two-particle entangled state with a message from a sender (Alice) to a receiver (Bob) via a six-particle entangled channel.
Qiming Luo +3 more
doaj +1 more source
Proxy Signatures Secure Against Proxy Key Exposure [PDF]
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure
Jacob C. N. Schuldt +2 more
openaire +1 more source
Magnetic nulls and super-radial expansion in the solar corona [PDF]
Magnetic fields in the sun's outer atmosphere -- the corona -- control both solar-wind acceleration and the dynamics of solar eruptions. We present the first clear observational evidence of coronal magnetic nulls in off-limb linearly polarized ...
Burkepile, Joan +7 more
core +3 more sources
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj +1 more source
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection [PDF]
[[abstract]]To detect any (unknown) virus, automatic signature schemes are proposed to be embedded in honestly-made compilers. But compiling load is centralized on the compiler makers.
Hwang, Shin-Jia
core +1 more source
An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Scheme
Zhou’s proxy multi-signature scheme was a safe and effective scheme, but this scheme was not safety enough. In this work, security analysis was given to the scheme and results showed that the scheme was very easy aggressed by the forgery attack. The paper proposed that any attacker can sign some certain unauthorized messages after the attacker knows a ...
openaire +1 more source
Provably secure and efficient proxy signature scheme
The size of proxy signature secret key in proxy signature scheme based on lattice basis delegation in fixed di-mension or bonsai tree is greater than that of original signature secret key.
Jie ZENG, Wei NIE
doaj +2 more sources
Attacks on One Designated Verifier Proxy Signature Scheme
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj +1 more source
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal +2 more
core
Discovery Prospects for a Supernova Signature of Biogenic Origin
Approximately 2.8 Myr before the present our planet was subjected to the debris of a supernova explosion. The terrestrial proxy for this event was the discovery of live atoms of 60Fe in a deep-sea ferromanganese crust.
Basu +27 more
core +1 more source

