Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
From MaRDI portal
Publication:1774853
DOI10.1016/j.amc.2004.04.097zbMath1070.94015OpenAlexW1994512167MaRDI QIDQ1774853
Publication date: 4 May 2005
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.amc.2004.04.097
IntegrityNonrepudiationElliptic curveMessage recoveryTraceabilityPublic key infrastructureSelf-certifiedThreshold proxy signature
Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Improvement of threshold proxy signature scheme
- Message recovery for signature schemes based on the discrete logarithm problem
- Identity-Based Cryptosystems and Signature Schemes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Elliptic Curve Cryptosystems
- New directions in cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability