Anonymous Proxy Signatures [PDF]
We define a general model for consecutive delegations of signing rights with the following properties: The delegatee actually signing and all intermediate delegators remain anonymous. As for group signatures, in case of misuse, a special authority can open signatures to reveal the chain of delegations and the signer's identity.
Fuchsbauer, Georg, Pointcheval, David
openaire +2 more sources
Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash
Proxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present.
Bao Haiyong, Cao Zhenfu
doaj +1 more source
Identity-Based Proxy Signature with Message Recovery over NTRU Lattice
Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications.
Faguo Wu, Bo Zhou, Xiao Zhang
doaj +1 more source
New Lattice-Based Short Proxy Signature Scheme With Fewer System Parameters in the Standard Model
Proxy signature schemes safely ensure that an original signer transfers the signing right to a proxy signer, and a variety of these schemes have been developed for secure applications.
Zecheng Wang +4 more
doaj +1 more source
A Short Linearly Homomorphic Proxy Signature Scheme
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin +4 more
doaj +1 more source
Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj +1 more source
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation.
Jiahui Chen +6 more
doaj +1 more source
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li +4 more
doaj +1 more source
Empirical analysis of the solar contribution to global mean air surface temperature change [PDF]
The solar contribution to global mean air surface temperature change is analyzed by using an empirical bi-scale climate model characterized by both fast and slow characteristic time responses to solar forcing: $\tau_1 =0.4 \pm 0.1$ yr, and $\tau_2= 8 \pm
Brohan +35 more
core +1 more source
Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation
We present a scheme for teleporting an unknown, two-particle entangled state with a message from a sender (Alice) to a receiver (Bob) via a six-particle entangled channel.
Qiming Luo +3 more
doaj +1 more source

