Sciweavers

113 search results - page 1 / 23
» Provable Security of ID-Based Proxy Signature Schemes
Sort
View
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 2 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
ICCNMC
2005
Springer
13 years 10 months ago
Provable Security of ID-Based Proxy Signature Schemes
Chunxiang Gu, Yuefei Zhu
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 4 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
ISPA
2005
Springer
13 years 10 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng
ATC
2007
Springer
13 years 11 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...