The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Most of proxy signa
โฆ LIBER โฆ
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials
โ Scribed by Tang, Shaohua; Xu, Lingling
- Book ID
- 122146477
- Publisher
- Elsevier Science
- Year
- 2014
- Tongue
- English
- Weight
- 490 KB
- Volume
- 30
- Category
- Article
- ISSN
- 0167-739X
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Provably secure proxy-protected signatur
โ
Zuhua Shao
๐
Article
๐
2009
๐
Elsevier Science
๐
English
โ 210 KB
Provable security of ID-based proxy mult
โ
Chunxiang Gu; Yuefei Zhu; Tao Zhao
๐
Article
๐
2007
๐
Wuhan University
๐
English
โ 301 KB
Efficient pairing-free provably secure i
โ
Zuowen Tan
๐
Article
๐
2012
๐
John Wiley and Sons
๐
English
โ 180 KB
Provably secure proxy convertible authen
โ
Wu, Tzong-Sun; Lin, Han-Yu
๐
Article
๐
2014
๐
Elsevier Science
๐
English
โ 947 KB
Provably secure randomized blind signatu
โ
Chun-I Fan; Wei-Zhe Sun; Vincent Shi-Ming Huang
๐
Article
๐
2010
๐
Elsevier Science
๐
English
โ 425 KB
Blind signature is a well-known technique used to construct some advanced applications for the consideration of user privacy. Various generic ideas and variants on blind signatures have been brought up so far, but few of them considered the randomization property or offered formal proofs. The concep
A secure proxy signature scheme based on
โ
Bin Hu; Chenhui Jin
๐
Article
๐
2006
๐
SP Science Press
๐
English
โ 203 KB