Directed proxy signature in the standard model
From MaRDI portal
Publication:2440176
DOI10.1007/S12204-011-1208-2zbMATH Open1283.94098OpenAlexW2314604166MaRDI QIDQ2440176FDOQ2440176
Publication date: 27 March 2014
Published in: Journal of Shanghai Jiaotong University (Science) (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12204-011-1208-2
Recommendations
- New \((t, n)\) threshold directed signature scheme with provable security
- ID-based directed proxy signature scheme from bilinear pairings
- Short designated verifier proxy signatures
- Designated verifier proxy signature scheme without random oracles
- [[:Publication:4373633|Title not available (Why is that?)]]
Cites Work
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- Designated Verifier Proofs and Their Applications
- Undeniable Signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- New \((t, n)\) threshold directed signature scheme with provable security
- Universally Convertible Directed Signatures
- Title not available (Why is that?)
- A secure identity-based multi-proxy signature scheme
- Applied Cryptography and Network Security
- Title not available (Why is that?)
Cited In (1)
This page was built for publication: Directed proxy signature in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2440176)