WOS: 000525736500001Proxy signature is a cryptographic primitive that allows an entity to delegate singing rights to another entity. Noticing the ad-hoc nature of security analysis prevalent in the existing literature, Boldyreva, Palacio and Warinschi proposed a formal security model for proxy signature. We revisit their proposed security definition in the context of the most natural construction of proxy signature - delegation-by-certificate. Our analysis indicates certain limitations of their definition that arise due to malleability of proxy signature as well as signature ownership in the context of standard signature. We propose a stronger definition of proxy signature to address these issues. However, we observe that the natural reduct...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract—Digital signature is a useful primitive to attain the integrity and authenticity in various...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract—Digital signature is a useful primitive to attain the integrity and authenticity in various...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/D...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...