Efficient certificateless proxy signature scheme with provable security
From MaRDI portal
(Redirected from Publication:454968)
Recommendations
Cites work
- scientific article; zbMATH DE number 1107690 (Why is no real title available?)
- scientific article; zbMATH DE number 2043331 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A New Proxy Signature Scheme Providing Self-delegation
- A novel efficient \((t,n)\) threshold proxy signature scheme
- A provably secure proxy signature scheme in certificateless cryptography
- Applied Cryptography and Network Security
- Certificateless public key cryptography
- Certificateless signature and proxy signature schemes from bilinear pairings
- Certificateless undeniable signature scheme
- Cryptology and Network Security
- Identity-based cryptosystems and signature schemes
- Information Security and Privacy
- Secure proxy signature schemes for delegation of signing rights
- Security arguments for digital signatures and blind signatures
- Simulatability and security of certificateless threshold signatures
- The state of elliptic curve cryptography
- Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
Cited in
(16)- Certificateless proxy signature scheme in the Standard Model
- Improvement of efficient proxy signature schemes using self-certified public keys
- A certificateless strong proxy signature scheme with random factors
- Black-box constructions of signature schemes in the bounded leakage setting
- scientific article; zbMATH DE number 2088321 (Why is no real title available?)
- A provably secure proxy signature scheme in certificateless cryptography
- A new certificateless proxy signature
- Efficient certificateless proxy signature scheme
- Certificateless proxy signature from RSA
- Efficient Certificateless Signature Schemes
- Provably secure certificateless proxy signature scheme in the standard model
- Generic security-amplifying methods of ordinary digital signatures
- Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
- An efficient certificateless proxy signature scheme without pairing
- Provably secure and efficient proxy signature with untrustworthy proxy signer
- Provably secure proxy-protected signature schemes based on RSA
This page was built for publication: Efficient certificateless proxy signature scheme with provable security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q454968)