Results 21 to 30 of about 138,426 (219)

Anonymous Proxy Signatures [PDF]

open access: yes, 2008
We define a general model for consecutive delegations of signing rights with the following properties: The delegatee actually signing and all intermediate delegators remain anonymous. As for group signatures, in case of misuse, a special authority can open signatures to reveal the chain of delegations and the signer's identity.
Fuchsbauer, Georg, Pointcheval, David
openaire   +2 more sources

Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash

open access: yesJournal of Intelligent Systems, 2013
Proxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present.
Bao Haiyong, Cao Zhenfu
doaj   +1 more source

Identity-Based Proxy Signature with Message Recovery over NTRU Lattice

open access: yesEntropy, 2023
Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications.
Faguo Wu, Bo Zhou, Xiao Zhang
doaj   +1 more source

New Lattice-Based Short Proxy Signature Scheme With Fewer System Parameters in the Standard Model

open access: yesIEEE Access, 2022
Proxy signature schemes safely ensure that an original signer transfers the signing right to a proxy signer, and a variety of these schemes have been developed for secure applications.
Zecheng Wang   +4 more
doaj   +1 more source

A Short Linearly Homomorphic Proxy Signature Scheme

open access: yesIEEE Access, 2018
Linearly homomorphic signature schemes allow the performance of linear computations on authenticated data. They are important primitives for many applications, such as electronic voting, smart grids, electronic health records, and so on.
Qun Lin   +4 more
doaj   +1 more source

Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing [PDF]

open access: yesJisuanji gongcheng, 2020
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing ...
NIU Shufen, LI Wenting, WANG Caifen
doaj   +1 more source

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation.
Jiahui Chen   +6 more
doaj   +1 more source

Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

open access: yesEntropy, 2023
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li   +4 more
doaj   +1 more source

Empirical analysis of the solar contribution to global mean air surface temperature change [PDF]

open access: yes, 2009
The solar contribution to global mean air surface temperature change is analyzed by using an empirical bi-scale climate model characterized by both fast and slow characteristic time responses to solar forcing: $\tau_1 =0.4 \pm 0.1$ yr, and $\tau_2= 8 \pm
Brohan   +35 more
core   +1 more source

Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation

open access: yesEntropy, 2022
We present a scheme for teleporting an unknown, two-particle entangled state with a message from a sender (Alice) to a receiver (Bob) via a six-particle entangled channel.
Qiming Luo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy