scientific article; zbMATH DE number 1107690
From MaRDI portal
Publication:4373633
Recommendations
Cited in
(63)- Anonymous Proxy Signatures
- Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
- Improvement of identity-based threshold proxy signature scheme with known signers
- Some proxy signature protocols
- Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
- Improvement of efficient proxy signature schemes using self-certified public keys
- Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
- Efficient proxy signature schemes using self-certified public keys
- Directed proxy signature in the standard model
- Designated verifier proxy signature scheme without random oracles
- scientific article; zbMATH DE number 5283706 (Why is no real title available?)
- scientific article; zbMATH DE number 1962143 (Why is no real title available?)
- scientific article; zbMATH DE number 1420971 (Why is no real title available?)
- Proxy signature schemes based on factoring
- New multi-proxy multi-signature schemes
- Nonrepudiable proxy multi-signature scheme
- Information Security and Cryptology - ICISC 2003
- Threshold-directed signature scheme based on hybrid number theoretic problems
- A traceable proxy multisignature scheme based on the elliptic curve cryptosystem
- Proxy Signatures Secure Against Proxy Key Exposure
- Progress in Cryptology - INDOCRYPT 2004
- Reputation management and signature delegation: A distributed approach
- Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
- Secure proxy signature schemes for delegation of signing rights
- Proxy signature with revocation
- Anonymous proxy signature scheme based on multivariate polynomials over finite field
- A new proxy signature scheme with revocation
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Efficient certificateless proxy signature scheme with provable security
- Efficient one-time proxy signatures
- Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
- Proxy-protected signature secure against the undelegated proxy signature attack
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- A universal composability framework for analysis of proxy threshold signature
- Identity-based threshold proxy signature from bilinear pairings
- Improvement of threshold proxy signature scheme
- New proxy multi-signature scheme
- Delegation with supervision
- Efficient proxy signcryption scheme with provable CCA and CMA security
- Factoring based proxy signature schemes
- \(k\)-time proxy signature: formal definition and efficient construction
- Threshold proxy re-signature
- Provably secure proxy-protected signature schemes based on factoring
- Provably secure proxy signature scheme from factorization
- Warrant-hiding delegation-by-certificate proxy signature schemes
- Self-certified multi-proxy signature schemes with message recovery
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
- ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
- A new quantum proxy signature model based on a series of genuine entangled states
- Proxy blind multi-signature scheme without a secure channel
- Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
- An Efficient ID-Based Proxy Signature Scheme from Pairings
- Formal language identity-based cryptography
- A novel efficient \((t,n)\) threshold proxy signature scheme
- A special proxy signature scheme with multi-warrant
- Provably secure proxy convertible authenticated encryption scheme based on RSA
- Establishing trust on VANET safety messages (Invited paper)
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
- Security of Lu et al.'s proxy-protected signature scheme
- Certificateless signature and proxy signature schemes from bilinear pairings
- mdTLS: how to make middlebox-aware TLS more efficient?
- Certificateless proxy signature from RSA
- scientific article; zbMATH DE number 2215775 (Why is no real title available?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4373633)