搜索结果: 1-15 共查到“军队指挥学 Proxy Signature”相关记录33条 . 查询时间(0.068 秒)
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
LTE Handover authentication scheme Proxy Signature
2018/11/12
Designing a secure and efficient handover authentication scheme has always been a concern of cellular networks especially in 4G Long Term Evolution (LTE) wireless networks. What makes their handover s...
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
public-key cryptography proxy key
2016/1/8
An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, ...
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
Multivariate Quadratic Problem Multivariate Public Key Cryptography
2014/3/5
Multivariate public key cryptography which relies on MQ (Multivariate Quadratic) problems is one of the main approaches to guarantee the security of communication in the post-quantum world. In this pa...
A provable secure anonymous proxy signature scheme without random oracles
public-key cryptography
2014/3/7
In order to protect the proxy signers’ privacy, many anonymous proxy signature schemes which are also called proxy ring signatures, have been proposed. Although the provable security in the random ora...
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
Proxy signatures digital signatures
2014/3/10
Proxy signatures allow an entity (the delegator) to delegate his signing capabilities to other entities (called proxies), who can then produce signatures on behalf of the delegator. Typically, a deleg...
Proxy signature schemes can be used in many business applications such as when the original signer is not present to sign important documents. Any proxy signature scheme has to meet the identifiabilit...
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Certicateless cryptography Multi-proxy signature
2011/7/25
Multi-proxy signature allows an original signer authorizing a proxy group as his proxy agent and only the cooperation of all proxy signers in the group can create a proxy signature on behalf of the or...
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Certificateless cryptography Multi-proxy signature Bilinear pairing Cryptanalysis
2012/3/27
Multi-proxy signature allows an original signer authorizing a proxy group as his proxy agent and only the cooperation of all proxy signers in the group can create a proxy signature on behalf of the or...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/27
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper
firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/22
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid ...
Security Analysis of a Proxy Signature Scheme over Braid Groups
Proxy Signature Scheme Braid Groups signer and proxy singer changing attacks
2009/6/12
Delegation of powers is a common practice in the
real world. To realized the delegation of powers electronically,
Mambo,Usuda and Okamoto proposed the
first proxy signature scheme in 1996. Since th...
A new identity based proxy signature scheme
Digital signature Proxy signature Identity based signature
2009/6/5
Proxy signature schemes allow a proxy signer to generate proxy signatures on
behalf of an original signer. Mambo et al. first introduced the notion of proxy signature and a lot of research work can b...
A Proxy Signature Scheme over Braid Groups
Proxy Signature Conjugacy Decision Problem Braid groups
2009/6/3
Proxy signatures, introduced by Mambo, Usuda and
Okamoto, allow a designated person to sign on behalf of an original
signer. Braid groups has been playing an important role in the theory of
cryptog...
Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
ID based cryptography designated verifiers proxy signatures
2009/6/2
Proxy signature schemes allow delegation of signing rights. The paper
proposes the notion of Identity Based Strong Bi-Designated Verifier Proxy Signature (IDSBDVPS)
schemes. In such schemes, only th...