Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem
Abstract — In a proxy signature scheme, a user delegates his/her signing capability to another user ...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...
A digital signature is an electronic signature form used by an original signer to sign a specific do...
A digital signature is an electronic signature form used by an original signer to sign a specific do...
[[abstract]]In the past few years, many excellent studies on proxy signature schemes have been publi...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
[[abstract]]A key exchange (or agreement) protocol is designed to allow two entities establishing a ...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
In a proxy signature scheme, a user delegates his/her signing capa-bility to another user in such a ...
[[abstract]]Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (L...
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provide...
Abstract — In a proxy signature scheme, a user delegates his/her signing capability to another user ...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy ...
A digital signature is an electronic signature form used by an original signer to sign a specific do...
A digital signature is an electronic signature form used by an original signer to sign a specific do...
[[abstract]]In the past few years, many excellent studies on proxy signature schemes have been publi...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
[[abstract]]A key exchange (or agreement) protocol is designed to allow two entities establishing a ...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
In a proxy signature scheme, a user delegates his/her signing capa-bility to another user in such a ...
[[abstract]]Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (L...
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provide...
Abstract — In a proxy signature scheme, a user delegates his/her signing capability to another user ...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...