Proxy signature distribution scheme over elliptic curve computation in a network
A proxy signature allows delegation of an owner’s signature to other parties to allow him/them to represent him/her. Given such delegation, traceability of the party representing the owner is important to maintain accountability over party actions. Also, the delegation process has to be sou...
Saved in:
Main Author: | Chin, Yee Kwan. |
---|---|
Other Authors: | Ma Maode |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/53379 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
A proxy signature-based handover authentication scheme for LTE wireless networks
by: Qiu, Yue, et al.
Published: (2017) -
Strong identity-based proxy signature schemes, revisited
by: LIU, Weiwei, et al.
Published: (2018) -
Proxy signature with revocation
by: XU, Shengmin, et al.
Published: (2016) -
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
by: Chen, J., et al.
Published: (2021) -
Analysis and implementation of National Security Agency suite B : elliptic-curve digital signature algorithm
by: Lei, Min.
Published: (2009)