We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender in case of misuse. We introduce a formal definition of an identity-based anonymous proxy signcryption (IBAPS) scheme and give a security model for it. We also construct an IBAPS scheme and prove its security under the discrete logarithm assumption and computational Diffie-Hellman assumption. Moreover, we do an efficiency comparison with the existing identity-based signcryption schemes and anonymous signcryption schemes and show that our scheme is much more efficient than those schemes, we also compare the efficien...
Abstract: A new ID-based anonymous proxy signature scheme from bilinear pairings was proposed in thi...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provide...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
Proxy signcryption means that the proxy signcrypter obtains the delegate authorization from the orig...
Abstract. Proxy signatures enable an originator to delegate the signing rights for a re-stricted set...
[[abstract]]Anonymous proxy signature schemes are used to protect proxy signers' privacy. Among the ...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Abstract. Delegation of rights is a common practice in the real world. We present two identity-based...
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more eff...
Signcryption is a cryptographic primitive which performs encryption and signature in a single logica...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such...
Abstract: A new ID-based anonymous proxy signature scheme from bilinear pairings was proposed in thi...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provide...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public ke...
Proxy signcryption means that the proxy signcrypter obtains the delegate authorization from the orig...
Abstract. Proxy signatures enable an originator to delegate the signing rights for a re-stricted set...
[[abstract]]Anonymous proxy signature schemes are used to protect proxy signers' privacy. Among the ...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such ...
Abstract. Delegation of rights is a common practice in the real world. We present two identity-based...
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more eff...
Signcryption is a cryptographic primitive which performs encryption and signature in a single logica...
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such...
Abstract: A new ID-based anonymous proxy signature scheme from bilinear pairings was proposed in thi...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
AbstractFor facilitating the confidential transaction with delegation such as on-line proxy auction ...