Efficient certificateless proxy signature scheme with provable security
From MaRDI portal
Publication:454968
DOI10.1016/J.INS.2011.11.005zbMATH Open1247.94037OpenAlexW1999695888MaRDI QIDQ454968FDOQ454968
Authors: Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim, Seung-Hyun Seo
Publication date: 2 October 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2011.11.005
Recommendations
Cites Work
- Security arguments for digital signatures and blind signatures
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security and Privacy
- Cryptology and Network Security
- Certificateless public key cryptography
- Secure proxy signature schemes for delegation of signing rights
- The state of elliptic curve cryptography
- Certificateless signature and proxy signature schemes from bilinear pairings
- A provably secure proxy signature scheme in certificateless cryptography
- Applied Cryptography and Network Security
- Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Simulatability and security of certificateless threshold signatures
- A novel efficient \((t,n)\) threshold proxy signature scheme
- Certificateless undeniable signature scheme
- A New Proxy Signature Scheme Providing Self-delegation
Cited In (16)
- Improvement of efficient proxy signature schemes using self-certified public keys
- Efficient Certificateless Signature Schemes
- Certificateless proxy signature scheme in the Standard Model
- Efficient certificateless proxy signature scheme
- Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
- Generic security-amplifying methods of ordinary digital signatures
- Title not available (Why is that?)
- Provably secure certificateless proxy signature scheme in the standard model
- A new certificateless proxy signature
- Provably secure proxy-protected signature schemes based on RSA
- A certificateless strong proxy signature scheme with random factors
- Black-box constructions of signature schemes in the bounded leakage setting
- A provably secure proxy signature scheme in certificateless cryptography
- Provably secure and efficient proxy signature with untrustworthy proxy signer
- An efficient certificateless proxy signature scheme without pairing
- Certificateless proxy signature from RSA
This page was built for publication: Efficient certificateless proxy signature scheme with provable security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q454968)