In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and secur
โฆ LIBER โฆ
On the security of an identity-based proxy multi-signature scheme
โ Scribed by Wang, B.
- Book ID
- 114443540
- Publisher
- The Institution of Engineering and Technology
- Year
- 2010
- Tongue
- English
- Weight
- 127 KB
- Volume
- 4
- Category
- Article
- ISSN
- 1751-8709
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
On the security of an identity based mul
โ
Hu Xiong; Jianbin Hu; Zhong Chen; Fagen Li
๐
Article
๐
2011
๐
Elsevier Science
๐
English
โ 208 KB
Provable security of ID-based proxy mult
โ
Chunxiang Gu; Yuefei Zhu; Tao Zhao
๐
Article
๐
2007
๐
Wuhan University
๐
English
โ 301 KB
An identity-based strong designated veri
โ
Wang Qin; Cao Zhenfu
๐
Article
๐
2006
๐
Wuhan University
๐
English
โ 267 KB
Efficient pairing-free provably secure i
โ
Zuowen Tan
๐
Article
๐
2012
๐
John Wiley and Sons
๐
English
โ 180 KB
A nominative multi-proxy signature schem
โ
Ma Chuan-gui; Gao Feng-xiu; Wang Yan
๐
Article
๐
2005
๐
Wuhan University
๐
English
โ 352 KB
Provably secure proxy-protected signatur
โ
Zuhua Shao
๐
Article
๐
2009
๐
Elsevier Science
๐
English
โ 210 KB
The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Most of proxy signa