Proxy Signatures Secure Against Proxy Key Exposure
From MaRDI portal
Publication:5445451
DOI10.1007/978-3-540-78440-1_9zbMath1162.94400OpenAlexW1587376951MaRDI QIDQ5445451
Kanta Matsuura, Kenneth G. Paterson, Jacob C. N. Schuldt
Publication date: 5 March 2008
Published in: Public Key Cryptography – PKC 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78440-1_9
Related Items
Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem ⋮ Provably secure proxy signature scheme from factorization ⋮ Security weakness of a certificate-based proxy signature scheme for IIoT environments ⋮ Secure proxy signature schemes for delegation of signing rights ⋮ Delegation of signing rights using certificateless proxy signatures ⋮ Provably secure certificate-based proxy blind signature scheme from pairings ⋮ An improved efficient identity-based proxy signature in the standard model
Cites Work
- Secure proxy signature schemes for delegation of signing rights
- Short signatures from the Weil pairing
- Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
- Identity-Based Cryptosystems and Signature Schemes
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- An Efficient ID-Based Proxy Signature Scheme from Pairings
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Strong Key-Insulated Signature Schemes
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Information Security and Cryptology - ICISC 2003
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item