Improvement of identity-based threshold proxy signature scheme with known signers
From MaRDI portal
Publication:3443248
Recommendations
- Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
- Theory and Applications of Models of Computation
- Improvement of threshold proxy signature scheme
- Cryptanalysis of threshold-proxy threshold-signature schemes
- A new threshold proxy signature scheme with known signers
Cites work
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 1107690 (Why is no real title available?)
- scientific article; zbMATH DE number 1951619 (Why is no real title available?)
- Identity-based cryptosystems and signature schemes
- Improvement of threshold proxy signature scheme
- Theory and Applications of Models of Computation
Cited in
(5)- scientific article; zbMATH DE number 5033877 (Why is no real title available?)
- Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
- Improvement of threshold proxy signature scheme
- scientific article; zbMATH DE number 2202168 (Why is no real title available?)
- Theory and Applications of Models of Computation
This page was built for publication: Improvement of identity-based threshold proxy signature scheme with known signers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3443248)