Proxy Re-signatures in the Standard Model
From MaRDI portal
Publication:3540149
Recommendations
- Proxy Re-signature Schemes Without Random Oracles
- Proxy re-signature scheme that translates one type of signature scheme to another type of signature scheme
- Threshold proxy re-signature
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
- Forward-secure unidirectional threshold proxy re-signature
Cites work
- scientific article; zbMATH DE number 1303118 (Why is no real title available?)
- scientific article; zbMATH DE number 2079932 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A forward-secure public-key encryption scheme
- Compact Group Signatures Without Random Oracles
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Proxy Re-signature Schemes Without Random Oracles
Cited in
(6)- Proxy Re-signature Schemes Without Random Oracles
- Advances in Cryptology - EUROCRYPT 2004
- Practical Time Capsule Signatures in the Standard Model from Bilinear Maps
- Proxy re-signature scheme that translates one type of signature scheme to another type of signature scheme
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
- Identity-based proxy re-signatures from lattices
This page was built for publication: Proxy Re-signatures in the Standard Model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3540149)