scientific article
From MaRDI portal
Publication:3149767
zbMath0994.68562MaRDI QIDQ3149767
Byoungcheon Lee, Kwangjo Kim, Heesun Kim
Publication date: 26 September 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2119/21190474
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99) Authentication, digital signatures and secret sharing (94A62)
Related Items (12)
An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem ⋮ Identity-based undetachable digital signature for mobile agents in electronic commerce ⋮ Provably secure proxy signature scheme from factorization ⋮ You can sign but not decrypt: hierarchical integrated encryption and signature ⋮ Directed proxy signature in the standard model ⋮ Designing efficient proxy signature schemes for mobile communication ⋮ A new proxy signature scheme with revocation ⋮ Designated verifier proxy signature scheme without random oracles ⋮ A novel efficient \((t,n)\) threshold proxy signature scheme ⋮ Factoring based proxy signature schemes ⋮ Proxy Signature with Revocation ⋮ Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
This page was built for publication: