Secure proxy signature schemes for delegation of signing rights

From MaRDI portal
Publication:421030

DOI10.1007/s00145-010-9082-xzbMath1272.94016OpenAlexW1976385711MaRDI QIDQ421030

Adriana Palacio, Alexandra Boldyreva, Bogdan Warinschi

Publication date: 23 May 2012

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-010-9082-x



Related Items

An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem, A closer look at multiple forking: leveraging (in)dependence for a tighter bound, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem, Delegation with supervision, Malleability and ownership of proxy signatures: towards a stronger definition and its limitations, Provably secure proxy signature scheme from factorization, Security weakness of a certificate-based proxy signature scheme for IIoT environments, Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature, Delegating signing rights in a multivariate proxy signature scheme, You can sign but not decrypt: hierarchical integrated encryption and signature, Secure proxy signature schemes for delegation of signing rights, Delegation of signing rights using certificateless proxy signatures, Provably secure certificate-based proxy blind signature scheme from pairings, FAS: forward secure sequential aggregate signatures for secure logging, Efficient certificateless proxy signature scheme with provable security, Certificateless proxy signature from RSA, Anonymous Proxy Signatures, Hybrid proxy multisignature: a new type multi-party signature, Zero-knowledge argument for simultaneous discrete logarithms, An improved efficient identity-based proxy signature in the standard model, Designated verifier proxy signature scheme without random oracles, Sequential Aggregate Signatures and Multisignatures Without Random Oracles, Factoring based proxy signature schemes, Proxy Signatures Secure Against Proxy Key Exposure, A secure identity-based proxy multi-signature scheme, Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures, A Schnorr-Like Lightweight Identity-Based Signature Scheme, Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures, Unnamed Item, Secure Proxy Multi-signature Scheme in the Standard Model, Security of Lu et al.'s proxy-protected signature scheme, Cryptanalysis of Zhou et al.'s proxy-protected signature schemes, Security pitfalls of an efficient threshold proxy signature scheme for mobile agents



Cites Work