scientific article; zbMATH DE number 1107690
From MaRDI portal
Publication:4373633
zbMATH Open0890.68049MaRDI QIDQ4373633FDOQ4373633
Authors: Seungjoo Kim, Sangjoon Park, Dongho Won
Publication date: 9 June 1998
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Reliability, testing and fault tolerance of networks and computer systems (68M15)
Cited In (63)
- Improvement of identity-based threshold proxy signature scheme with known signers
- Some proxy signature protocols
- Anonymous proxy signature scheme based on multivariate polynomials over finite field
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- A special proxy signature scheme with multi-warrant
- mdTLS: how to make middlebox-aware TLS more efficient?
- Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
- Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
- Improvement of efficient proxy signature schemes using self-certified public keys
- Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
- Efficient proxy signature schemes using self-certified public keys
- Directed proxy signature in the standard model
- Title not available (Why is that?)
- Designated verifier proxy signature scheme without random oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security and Cryptology - ICISC 2003
- Proxy signature schemes based on factoring
- Threshold-directed signature scheme based on hybrid number theoretic problems
- New multi-proxy multi-signature schemes
- Nonrepudiable proxy multi-signature scheme
- Proxy Signatures Secure Against Proxy Key Exposure
- A traceable proxy multisignature scheme based on the elliptic curve cryptosystem
- Progress in Cryptology - INDOCRYPT 2004
- Reputation management and signature delegation: A distributed approach
- Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
- Secure proxy signature schemes for delegation of signing rights
- Proxy signature with revocation
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Efficient one-time proxy signatures
- A new proxy signature scheme with revocation
- Efficient certificateless proxy signature scheme with provable security
- Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
- Proxy-protected signature secure against the undelegated proxy signature attack
- Identity-based threshold proxy signature from bilinear pairings
- A universal composability framework for analysis of proxy threshold signature
- Improvement of threshold proxy signature scheme
- New proxy multi-signature scheme
- Delegation with supervision
- Efficient proxy signcryption scheme with provable CCA and CMA security
- Factoring based proxy signature schemes
- \(k\)-time proxy signature: formal definition and efficient construction
- Threshold proxy re-signature
- Provably secure proxy-protected signature schemes based on factoring
- Warrant-hiding delegation-by-certificate proxy signature schemes
- Provably secure proxy signature scheme from factorization
- Self-certified multi-proxy signature schemes with message recovery
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
- ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
- A new quantum proxy signature model based on a series of genuine entangled states
- Proxy blind multi-signature scheme without a secure channel
- Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
- An Efficient ID-Based Proxy Signature Scheme from Pairings
- Formal language identity-based cryptography
- A novel efficient \((t,n)\) threshold proxy signature scheme
- Establishing trust on VANET safety messages (Invited paper)
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
- Provably secure proxy convertible authenticated encryption scheme based on RSA
- Security of Lu et al.'s proxy-protected signature scheme
- Certificateless signature and proxy signature schemes from bilinear pairings
- Title not available (Why is that?)
- Anonymous Proxy Signatures
- Certificateless proxy signature from RSA
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4373633)