scientific article; zbMATH DE number 1107690
From MaRDI portal
Publication:4373633
zbMath0890.68049MaRDI QIDQ4373633
Sangjoon Park, Dongho Won, Seungjoo Kim
Publication date: 9 June 1998
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Reliability, testing and fault tolerance of networks and computer systems (68M15)
Related Items
Improvement of identity-based threshold proxy signature scheme with known signers, Delegation with supervision, Reputation management and signature delegation: A distributed approach, Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification, A universal composability framework for analysis of proxy threshold signature, Provably secure proxy signature scheme from factorization, Efficient proxy signcryption scheme with provable CCA and CMA security, You can sign but not decrypt: hierarchical integrated encryption and signature, Secure proxy signature schemes for delegation of signing rights, New multi-proxy multi-signature schemes, Nonrepudiable proxy multi-signature scheme, Directed proxy signature in the standard model, Efficient certificateless proxy signature scheme with provable security, Certificateless proxy signature from RSA, A new quantum proxy signature model based on a series of genuine entangled states, Provably secure proxy convertible authenticated encryption scheme based on RSA, A new proxy signature scheme with revocation, New proxy multi-signature scheme, Designated verifier proxy signature scheme without random oracles, A traceable proxy multisignature scheme based on the elliptic curve cryptosystem, A novel efficient \((t,n)\) threshold proxy signature scheme, Provably secure proxy-protected signature schemes based on factoring, Proxy blind multi-signature scheme without a secure channel, Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability, Factoring based proxy signature schemes, An Efficient ID-Based Proxy Signature Scheme from Pairings, Proxy Signatures Secure Against Proxy Key Exposure, Establishing Trust on VANET Safety Messages, Proxy Signature with Revocation, Threshold-directed signature scheme based on hybrid number theoretic problems, Self-certified multi-proxy signature schemes with message recovery, Unnamed Item, Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes, Certificateless signature and proxy signature schemes from bilinear pairings, Security of Lu et al.'s proxy-protected signature scheme, Cryptanalysis of Zhou et al.'s proxy-protected signature schemes, ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings, Improvement of efficient proxy signature schemes using self-certified public keys, Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack, Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers, Efficient proxy signature schemes using self-certified public keys, Proxy signature schemes based on factoring, Improvement of threshold proxy signature scheme, Formal Language Identity-based Cryptography