Designated verifier proxy signature scheme without random oracles
From MaRDI portal
Publication:971640
DOI10.1016/j.camwa.2009.01.032zbMath1186.94480OpenAlexW2026258103MaRDI QIDQ971640
Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao
Publication date: 16 May 2010
Published in: Computers \& Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2009.01.032
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Provably secure proxy signature scheme from factorization ⋮ Attacks on one designated verifier proxy signature scheme
Cites Work
- Secure proxy signature schemes for delegation of signing rights
- A novel ID-based designated verifier signature scheme
- Designated verifier proxy signature scheme with message recovery
- Designated Verifier Proofs and Their Applications
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- Information Security and Cryptology - ICISC 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Designated verifier proxy signature scheme without random oracles