Efficient proxy signature schemes using self-certified public keys
DOI10.1016/S0096-3003(03)00596-4zbMath1077.94020OpenAlexW2073684972MaRDI QIDQ2577791
Publication date: 9 January 2006
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0096-3003(03)00596-4
Non-repudiationAuthenticationIntegrityProxy signaturePublic key infrastructureSelf-certifiedSmart cards
Cryptography (94A60) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Cites Work
This page was built for publication: Efficient proxy signature schemes using self-certified public keys