Security Analysis of Some Proxy Signature
A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of...
Saved in:
Main Authors: | WANG, Guilin, BAO, Feng, ZHOU, Jianying, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2004
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1075 https://ink.library.smu.edu.sg/context/sis_research/article/2074/viewcontent/SecurityAnalysis_ProxySignature_2004_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
by: WANG, Guilin, et al.
Published: (2004) -
Proxy Signature Scheme with Multiple Original Signers for Wireless E-Commerce Applications
by: WANG, Guilin, et al.
Published: (2004) -
Security remarks on a group signature scheme with member deletion
by: WANG, Guilin, et al.
Published: (2003) -
Anonymous proxy signature with hierarchical traceability
by: WEI, Jiannan, et al.
Published: (2016) -
Proxy signature with revocation
by: XU, Shengmin, et al.
Published: (2016)