Abstract. A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we propose two proxy signature schemes based on RSA cryptosystems. The proposed first scheme does not consider proxy revocation mechanism; however, it will help us to compare our protocol with the existing RSA-based schemes. The proposed second scheme provides an effective proxy revocation mechanism. The proposed schemes do not require any secu...
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages o...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
[[abstract]]In current proxy signature schemes, an original signer delegates her/his signing capabil...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
[[abstract]]Proxy signature allows one user to delegate his signing capacity to other people. No pro...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
Due to the rapid growth in modern communication systems, fault tolerance and data security are two i...
Digital signature is a useful primitive to attain the integrity and authenticity in various wire or ...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
Abstract—In this paper, we first propose the definition and security model of certificate-based prox...
Abstract. Proxy re-signatures are generally used for the delegation of signing rights of a user (del...
AbstractAuthorization mechanism is introduced to prevent the on-line original signer problem in this...
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages o...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
[[abstract]]In current proxy signature schemes, an original signer delegates her/his signing capabil...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
[[abstract]]Proxy signature allows one user to delegate his signing capacity to other people. No pro...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
Due to the rapid growth in modern communication systems, fault tolerance and data security are two i...
Digital signature is a useful primitive to attain the integrity and authenticity in various wire or ...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
Abstract—In this paper, we first propose the definition and security model of certificate-based prox...
Abstract. Proxy re-signatures are generally used for the delegation of signing rights of a user (del...
AbstractAuthorization mechanism is introduced to prevent the on-line original signer problem in this...
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages o...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group o...