Directed proxy signature in the standard model
From MaRDI portal
Publication:2440176
DOI10.1007/S12204-011-1208-2zbMATH Open1283.94098OpenAlexW2314604166MaRDI QIDQ2440176FDOQ2440176
Authors: Yang Ming, Yu-Min Wang
Publication date: 27 March 2014
Published in: Journal of Shanghai Jiaotong University (Science) (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12204-011-1208-2
Recommendations
Cites Work
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- Designated verifier proofs and their applications
- Undeniable Signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- New \((t, n)\) threshold directed signature scheme with provable security
- Universally Convertible Directed Signatures
- Title not available (Why is that?)
- A secure identity-based multi-proxy signature scheme
- Applied Cryptography and Network Security
- Title not available (Why is that?)
Cited In (3)
This page was built for publication: Directed proxy signature in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2440176)