AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of proxy signers. In this protocol, the original signer delegates his/her signing capability to a predefined hierarchy of proxy signers. Given the documents of a security class to be signed by the original signer, our scheme suggests a protocol for the hierarchy of proxy signers to sign the document on behalf of the original signer. The concept of hierarchical access control limits the number of people who could sign the document to the people who have the required security clearances. User in a security class requires two secret keys: one which identifies his/her security clearance, and that can also be derived by a user of upper level security cle...
Securing different online e-business activities usually requires applying different cryptographic al...
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very...
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
The original publication is available at www.springerlink.comInternational audienceWe define a gener...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Securing different online e-business activities usually requires applying different cryptographic al...
Securing different online e-business activities usually requires applying different cryptographic al...
Securing different online e-business activities usually requires applying different cryptographic al...
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very...
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very...
AbstractIn this paper, we propose a new security protocol for proxy signature by a hierarchy of prox...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such...
Abstract. For the last two decades the notion and implementations of proxy signatures have been used...
The original publication is available at www.springerlink.comInternational audienceWe define a gener...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers...
Securing different online e-business activities usually requires applying different cryptographic al...
Securing different online e-business activities usually requires applying different cryptographic al...
Securing different online e-business activities usually requires applying different cryptographic al...
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very...
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very...