搜索结果: 1-11 共查到“Proxy Signature Scheme”相关记录11条 . 查询时间(0.049 秒)
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
public-key cryptography proxy key
2016/1/8
An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, ...
A provable secure anonymous proxy signature scheme without random oracles
public-key cryptography
2014/3/7
In order to protect the proxy signers’ privacy, many anonymous proxy signature schemes which are also called proxy ring signatures, have been proposed. Although the provable security in the random ora...
Proxy signature schemes can be used in many business applications such as when the original signer is not present to sign important documents. Any proxy signature scheme has to meet the identifiabilit...
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Certicateless cryptography Multi-proxy signature
2011/7/25
Multi-proxy signature allows an original signer authorizing a proxy group as his proxy agent and only the cooperation of all proxy signers in the group can create a proxy signature on behalf of the or...
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Certificateless cryptography Multi-proxy signature Bilinear pairing Cryptanalysis
2012/3/27
Multi-proxy signature allows an original signer authorizing a proxy group as his proxy agent and only the cooperation of all proxy signers in the group can create a proxy signature on behalf of the or...
Security Analysis of a Proxy Signature Scheme over Braid Groups
Proxy Signature Scheme Braid Groups signer and proxy singer changing attacks
2009/6/12
Delegation of powers is a common practice in the
real world. To realized the delegation of powers electronically,
Mambo,Usuda and Okamoto proposed the
first proxy signature scheme in 1996. Since th...
A new identity based proxy signature scheme
Digital signature Proxy signature Identity based signature
2009/6/5
Proxy signature schemes allow a proxy signer to generate proxy signatures on
behalf of an original signer. Mambo et al. first introduced the notion of proxy signature and a lot of research work can b...
A Proxy Signature Scheme over Braid Groups
Proxy Signature Conjugacy Decision Problem Braid groups
2009/6/3
Proxy signatures, introduced by Mambo, Usuda and
Okamoto, allow a designated person to sign on behalf of an original
signer. Braid groups has been playing an important role in the theory of
cryptog...
Park and Lee have proposed a digital nominative proxy signature
scheme for mobile communication in [1]. They claimed that neither Origin signer
nor Proxy agent can generate a valid signature solely....
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
proxy signature digital signature public key cryptosystem
2009/3/24
In a (t, n) proxy signature scheme, the original signer can delegate his/her
signing capability to n proxy signers such that any t or more proxy singers can sign
messages on behalf of the former, bu...
An Efficient ID-based Proxy Signature Scheme from Pairings
ID-based cryptography proxy signatures bilinear pairings
2008/11/19
This paper proposes a new ID-based proxy signature scheme
based on the bilinear pairings. The number of paring operation involved
in the verification procedure of our scheme is only one, so our sche...