A proxy signature scheme permits an entity to delegate its signing rights to another entity. These schemes have been suggested for use in numerous applications, particularly in distributed computing. But to date, no proxy signature schemes with guaranteed security have been proposed; no precise definitions or proofs of security have been provided for such schemes. In this paper, we formalize a notion of security for proxy signature schemes and present provably-secure schemes. We analyze the security of the well-known delegation-by-certificate scheme and show that after some slight but important modifications, the resulting scheme is secure, assuming the underlying standard signature scheme is secure. We then show that employment of the rece...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
WOS: 000525736500001Proxy signature is a cryptographic primitive that allows an entity to delegate s...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract. In this paper, we first construct a security model for delegation-by-warrant ID-based prox...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
Abstract—In this paper, we first propose the definition and security model of certificate-based prox...
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages o...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
In a designated verifier proxy signature scheme, there are three participants, namely, the original ...
AbstractIn a designated verifier proxy signature scheme, one can delegate his or her signing capabil...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
WOS: 000525736500001Proxy signature is a cryptographic primitive that allows an entity to delegate s...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract. In this paper, we first construct a security model for delegation-by-warrant ID-based prox...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
Abstract—In this paper, we first propose the definition and security model of certificate-based prox...
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages o...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
In a designated verifier proxy signature scheme, there are three participants, namely, the original ...
AbstractIn a designated verifier proxy signature scheme, one can delegate his or her signing capabil...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...