Proxy Re-signatures in the Standard Model
From MaRDI portal
Publication:3540149
DOI10.1007/978-3-540-85886-7_18zbMath1181.94111OpenAlexW2153236905MaRDI QIDQ3540149
Raphael C.-W. Phan, Sherman S. M. Chow
Publication date: 20 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85886-7_18
Related Items
Identity-based proxy re-signatures from lattices ⋮ Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
Cites Work
- Unnamed Item
- Unnamed Item
- A forward-secure public-key encryption scheme
- Compact Group Signatures Without Random Oracles
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Proxy Re-signature Schemes Without Random Oracles