Sciweavers

34 search results - page 2 / 7
» A Provably Secure Proxy Signature Scheme in Certificateless ...
Sort
View
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
13 years 3 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ISPEC
2005
Springer
13 years 11 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
CCS
2008
ACM
13 years 7 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
EUROCRYPT
2004
Springer
13 years 11 months ago
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable flexi...
Tal Malkin, Satoshi Obana, Moti Yung
ICCNMC
2005
Springer
13 years 11 months ago
Provable Security of ID-Based Proxy Signature Schemes
Chunxiang Gu, Yuefei Zhu