[[abstract]]In this article, we proposed a batch verification scheme for multiple proxy signatures to reduce the proxy signature verification time. The proposed scheme is not only efficient because it does not verify each individual proxy signature separately, but also secure because it can detect forged multiple proxy signatures without failure. Read More: http://www.worldscientific.com/doi/abs/10.1142/S012962641100008
[[abstract]]In order to reduce the multiple-signature verification time quite, some investigations o...
[[abstract]]Recently, Hwang and Chen [5] proposed a variation of proxy signature scheme called the m...
[[abstract]]In the (t,n) proxy signature scheme, the signature signed by the original signer can be ...
[[abstract]]The proxy multi-signature is a very useful tool, which allows multiple signers to genera...
[[abstract]]Invalid signatures produced by some adversaries may pose a severe challenge to the recip...
[[abstract]]A new kind of proxy signature schemes is first proposed: multi-proxy multi-signature sch...
The concept of batch verifying multiple RSA digital signatures is to find a method that multiple dig...
In Eurocrypt 2007, Camenisch, Hohenberger and Pedersen introduced the notion of multi-signer batch v...
[[abstract]]Recently, Hwang et al. proposed a simple batch verifying multiple RSA digital signatures...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
[[abstract]]In this paper, we shall propose a threshold multi-proxy multi-signature scheme with shar...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]All previously proposed threshold proxy signature schemes have been based on discrete lo...
[[abstract]]A proxy signature scheme is a method which allows an original signer to delegate his sig...
[[abstract]]In this paper, the authors have introduced three authentication methods including RSA, H...
[[abstract]]In order to reduce the multiple-signature verification time quite, some investigations o...
[[abstract]]Recently, Hwang and Chen [5] proposed a variation of proxy signature scheme called the m...
[[abstract]]In the (t,n) proxy signature scheme, the signature signed by the original signer can be ...
[[abstract]]The proxy multi-signature is a very useful tool, which allows multiple signers to genera...
[[abstract]]Invalid signatures produced by some adversaries may pose a severe challenge to the recip...
[[abstract]]A new kind of proxy signature schemes is first proposed: multi-proxy multi-signature sch...
The concept of batch verifying multiple RSA digital signatures is to find a method that multiple dig...
In Eurocrypt 2007, Camenisch, Hohenberger and Pedersen introduced the notion of multi-signer batch v...
[[abstract]]Recently, Hwang et al. proposed a simple batch verifying multiple RSA digital signatures...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
[[abstract]]In this paper, we shall propose a threshold multi-proxy multi-signature scheme with shar...
[[abstract]]In this article, we shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3...
[[abstract]]All previously proposed threshold proxy signature schemes have been based on discrete lo...
[[abstract]]A proxy signature scheme is a method which allows an original signer to delegate his sig...
[[abstract]]In this paper, the authors have introduced three authentication methods including RSA, H...
[[abstract]]In order to reduce the multiple-signature verification time quite, some investigations o...
[[abstract]]Recently, Hwang and Chen [5] proposed a variation of proxy signature scheme called the m...
[[abstract]]In the (t,n) proxy signature scheme, the signature signed by the original signer can be ...