An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
DOI10.1007/978-3-642-04434-2_6zbMATH Open1184.94262OpenAlexW1612522860MaRDI QIDQ3556589FDOQ3556589
Authors: Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Haifeng Qian, Zhenfu Cao
Publication date: 24 April 2010
Published in: Security and Privacy in Mobile Information and Communication Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04434-2_6
Recommendations
- A nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
- A \((t,n)\) threshold signature scheme based on self-certified public keys
- An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem
- Efficient proxy signature schemes using self-certified public keys
- An improved proxy blind signature scheme based on ECDLP
- Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
- A secure threshold Paillier proxy signature scheme
- scientific article; zbMATH DE number 5033877
- Proxy signature scheme using self-certified public keys
- Improvement of efficient proxy signature schemes using self-certified public keys
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Distributed Provers with Applications to Undeniable Signatures
- Improvement of threshold proxy signature scheme
- Title not available (Why is that?)
- Title not available (Why is that?)
- Nonrepudiable proxy multi-signature scheme
- Efficient proxy signature schemes using self-certified public keys
- Title not available (Why is that?)
Cited In (4)
This page was built for publication: An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3556589)