Directed proxy signature in the standard model
From MaRDI portal
Publication:2440176
Recommendations
Cites work
- scientific article; zbMATH DE number 1808281 (Why is no real title available?)
- scientific article; zbMATH DE number 1024018 (Why is no real title available?)
- scientific article; zbMATH DE number 1088906 (Why is no real title available?)
- scientific article; zbMATH DE number 1107690 (Why is no real title available?)
- scientific article; zbMATH DE number 1962143 (Why is no real title available?)
- scientific article; zbMATH DE number 2109736 (Why is no real title available?)
- scientific article; zbMATH DE number 1420971 (Why is no real title available?)
- A secure identity-based multi-proxy signature scheme
- Applied Cryptography and Network Security
- Designated verifier proofs and their applications
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- New \((t, n)\) threshold directed signature scheme with provable security
- Undeniable Signatures
- Universally Convertible Directed Signatures
Cited in
(3)
This page was built for publication: Directed proxy signature in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2440176)