An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...