Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
From MaRDI portal
Publication:2176286
Recommendations
Cites work
- scientific article; zbMATH DE number 1341873 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A “Paradoxical” Solution to The Signature Problem
- Another look at security definitions
- Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- Digital Signatures Do Not Guarantee Exclusive Ownership
- Information Security and Privacy
- Intrinsic limitations of digital signatures and how to cope with them
- Public key signatures in the multi-user setting.
- Secure proxy signature schemes for delegation of signing rights
- Security of signature schemes in a multi-user setting
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
Cited in
(2)
This page was built for publication: Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2176286)