Secure proxy signature schemes for delegation of signing rights
From MaRDI portal
Publication:421030
DOI10.1007/s00145-010-9082-xzbMath1272.94016OpenAlexW1976385711MaRDI QIDQ421030
Adriana Palacio, Alexandra Boldyreva, Bogdan Warinschi
Publication date: 23 May 2012
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9082-x
digital signaturesaggregate signaturesdelegation-by-certificate schemeprovably-secure schemesproxy signature scheme
Related Items
An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem, A closer look at multiple forking: leveraging (in)dependence for a tighter bound, Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles, Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem, Delegation with supervision, Malleability and ownership of proxy signatures: towards a stronger definition and its limitations, Provably secure proxy signature scheme from factorization, Security weakness of a certificate-based proxy signature scheme for IIoT environments, Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature, Delegating signing rights in a multivariate proxy signature scheme, You can sign but not decrypt: hierarchical integrated encryption and signature, Secure proxy signature schemes for delegation of signing rights, Delegation of signing rights using certificateless proxy signatures, Provably secure certificate-based proxy blind signature scheme from pairings, FAS: forward secure sequential aggregate signatures for secure logging, Efficient certificateless proxy signature scheme with provable security, Certificateless proxy signature from RSA, Anonymous Proxy Signatures, Hybrid proxy multisignature: a new type multi-party signature, Zero-knowledge argument for simultaneous discrete logarithms, An improved efficient identity-based proxy signature in the standard model, Designated verifier proxy signature scheme without random oracles, Sequential Aggregate Signatures and Multisignatures Without Random Oracles, Factoring based proxy signature schemes, Proxy Signatures Secure Against Proxy Key Exposure, A secure identity-based proxy multi-signature scheme, Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures, A Schnorr-Like Lightweight Identity-Based Signature Scheme, Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures, Unnamed Item, Secure Proxy Multi-signature Scheme in the Standard Model, Security of Lu et al.'s proxy-protected signature scheme, Cryptanalysis of Zhou et al.'s proxy-protected signature schemes, Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Cites Work
- Secure proxy signature schemes for delegation of signing rights
- Efficient signature generation by smart cards
- Security arguments for digital signatures and blind signatures
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Unrestricted Aggregate Signatures
- Proxy Signatures Secure Against Proxy Key Exposure
- Progress in Cryptology - INDOCRYPT 2004
- Information Security and Cryptology - ICISC 2003
- Computer Aided Verification
- Advances in Cryptology - ASIACRYPT 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item