Sciweavers

138 search results - page 2 / 28
» A Proposal of Short Proxy Signature using Pairing
Sort
View
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
14 years 6 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
15 years 10 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
CORR
2006
Springer
112views Education» more  CORR 2006»
14 years 9 months ago
Algorithms and Approaches of Proxy Signature: A Survey
Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable pr...
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
IJNSEC
2006
67views more  IJNSEC 2006»
14 years 9 months ago
A Time-stamping Proxy Signature Scheme Using Time-stamping Service
In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original si...
Eric Jui-Lin Lu, Cheng-Jian Huang
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
15 years 10 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao