Strong Designated Verifier Proxy Signature (SDVPS) Scheme is the combination of the proxy signature scheme and the designated verifier signature scheme. An SDVPS scheme enables the proxy signer, on behalf of the original signer, to sign a message. A designated verifier can only check the validity of the signature. Lin et al. proved that their scheme is resistant against existential forgery under adaptive chosen-message attacks (EF-CMA), Lin et al. (2012). However, Zhou showed in Attacks on a Strong Designated Verifier Proxy Signature Scheme , Zhou (2014a) that their scheme was insecure by giving four attacks and Zhou proposed an improvement on their scheme which he wrote in his paper Improvement on Lin et als Strong Designated Verifier Prox...
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such t...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion...
A strong designated verifier signature (SDVS) scheme only allows the designated verifier to validate...
In a designated verifier proxy signature scheme, there are three participants, namely, the original ...
Abstract. In a proxy signature scheme, a user delegates his/her signing capability to another user i...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their...
Digital signature scheme is an important research topic in cryptography. An ordinary digital signatu...
Abstract: A Designated Verifier Signature (DVS) scheme has the property of signer ambiguity, which c...
[[abstract]]Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (L...
[[abstract]]In 1996, a new category of signature scheme called a proxy signature was proposed by Mam...
[[abstract]]Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusio...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Proxy signature is a useful cryptographic primitive that has been widely used in many applications. ...
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such t...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion...
A strong designated verifier signature (SDVS) scheme only allows the designated verifier to validate...
In a designated verifier proxy signature scheme, there are three participants, namely, the original ...
Abstract. In a proxy signature scheme, a user delegates his/her signing capability to another user i...
Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature s...
proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their...
Digital signature scheme is an important research topic in cryptography. An ordinary digital signatu...
Abstract: A Designated Verifier Signature (DVS) scheme has the property of signer ambiguity, which c...
[[abstract]]Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (L...
[[abstract]]In 1996, a new category of signature scheme called a proxy signature was proposed by Mam...
[[abstract]]Sun's nonrepudiation threshold proxy signature scheme is not secure against the collusio...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Proxy signature is a useful cryptographic primitive that has been widely used in many applications. ...
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such t...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collu-sion...