Anonymous proxy signature with hierarchical traceability
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such as anonymous voting and anonymous authentication protocols. As a basic requirement, we should ensure an honest proxy signer is anonymous. However, in order to prevent the proxy signer from abusing the...
Saved in:
Main Authors: | WEI, Jiannan, YANG, Guomin, MU, Yi, LIANG, Kaitai |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7357 https://ink.library.smu.edu.sg/context/sis_research/article/8360/viewcontent/Anonymous_Proxy_Signature_with_Hierarchical_Traceability.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Security Analysis of Some Proxy Signature
by: WANG, Guilin, et al.
Published: (2004) -
K-time proxy signature: Formal definition and efficient construction
by: LIU, Weiwei, et al.
Published: (2013) -
Proxy signature with revocation
by: XU, Shengmin, et al.
Published: (2016) -
Proxy Signature Scheme with Multiple Original Signers for Wireless E-Commerce Applications
by: WANG, Guilin, et al.
Published: (2004) -
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
by: WANG, Guilin, et al.
Published: (2004)