Sciweavers

64 search results - page 2 / 13
» Proxy Cryptography Revisited
Sort
View
TCC
2007
Springer
76views Cryptology» more  TCC 2007»
13 years 10 months ago
Designated Confirmer Signatures Revisited
Douglas Wikström
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 4 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
ISPEC
2005
Springer
13 years 10 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
13 years 11 months ago
Revisiting the IDEA Philosophy
Pascal Junod, Marco Macchetti
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
13 years 10 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo