Designated verifier proxy signature scheme with message recovery
From MaRDI portal
Publication:2571972
DOI10.1016/j.amc.2004.10.070zbMath1076.94032OpenAlexW2080184598MaRDI QIDQ2571972
Publication date: 14 November 2005
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.amc.2004.10.070
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Related Items
Provably secure proxy signature scheme from factorization, ID-based directed proxy signature scheme from bilinear pairings, Attacks on one designated verifier proxy signature scheme, Designated verifier proxy signature scheme without random oracles
Cites Work
- Unnamed Item
- Efficient signature generation by smart cards
- Proxy blind multi-signature scheme without a secure channel
- Proxy signature schemes based on factoring
- The state of elliptic curve cryptography
- A robust \((k,n)+1\) threshold proxy signature scheme based on factoring
- Security Proofs for Signature Schemes