Strong identity-based proxy signature schemes, revisited
Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that ha...
Saved in:
Main Authors: | LIU, Weiwei, MU, Yi, YANG, Guomin, TIAN, Yangguang |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5308 https://ink.library.smu.edu.sg/context/sis_research/article/6311/viewcontent/Strong_Identity_Proxy_Sign_Revisited_pvoa.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Identity-based strong designated verifier signature revisited
by: HUANG, Qiong, et al.
Published: (2011) -
K-time proxy signature: Formal definition and efficient construction
by: LIU, Weiwei, et al.
Published: (2013) -
Proxy signature with revocation
by: XU, Shengmin, et al.
Published: (2016) -
Anonymous proxy signature with hierarchical traceability
by: WEI, Jiannan, et al.
Published: (2016) -
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
by: WANG, Guilin, et al.
Published: (2004)