Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
From MaRDI portal
Publication:2350583
DOI10.1016/J.IPL.2013.10.006zbMATH Open1338.94087OpenAlexW2087188930MaRDI QIDQ2350583FDOQ2350583
Authors: Yong Yu, Yi Mu, Willy Susilo, Man Ho Au
Publication date: 25 June 2015
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://ro.uow.edu.au/cgi/viewcontent.cgi?article=2809&context=eispapers
Recommendations
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Cryptanalysis of short RSA secret exponents
- Cryptanalysis of RSA with private key d less than N/sup 0.292/
- Riemann's hypothesis and tests for primality
- Title not available (Why is that?)
- Secure proxy signature schemes for delegation of signing rights
- Title not available (Why is that?)
- Proxy signature schemes based on factoring
- Provably secure proxy signature scheme from factorization
- Title not available (Why is that?)
Cited In (3)
This page was built for publication: Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2350583)