Proxy Signatures Secure Against Proxy Key Exposure
From MaRDI portal
Publication:5445451
Recommendations
- Secure proxy signature schemes for delegation of signing rights
- Secure Proxy Multi-signature Scheme in the Standard Model
- Information Security and Cryptology - ICISC 2003
- A New Proxy Signature Scheme Providing Self-delegation
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
Cites work
- scientific article; zbMATH DE number 1304302 (Why is no real title available?)
- scientific article; zbMATH DE number 1107690 (Why is no real title available?)
- scientific article; zbMATH DE number 1951619 (Why is no real title available?)
- scientific article; zbMATH DE number 1962143 (Why is no real title available?)
- scientific article; zbMATH DE number 2009971 (Why is no real title available?)
- scientific article; zbMATH DE number 2043331 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1420971 (Why is no real title available?)
- scientific article; zbMATH DE number 2222187 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
- An Efficient ID-Based Proxy Signature Scheme from Pairings
- Efficient one-time proxy signatures
- Identity-based cryptosystems and signature schemes
- Information Security and Cryptology - ICISC 2003
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
- Secure proxy signature schemes for delegation of signing rights
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Short signatures from the Weil pairing
- Strong Key-Insulated Signature Schemes
Cited in
(14)- scientific article; zbMATH DE number 1962143 (Why is no real title available?)
- scientific article; zbMATH DE number 1420971 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- An improved efficient identity-based proxy signature in the standard model
- Secure proxy signature schemes for delegation of signing rights
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem
- Delegation of signing rights using certificateless proxy signatures
- A New Proxy Signature Scheme Providing Self-delegation
- Proxy-protected signature secure against the undelegated proxy signature attack
- Security weakness of a certificate-based proxy signature scheme for IIoT environments
- Provably secure proxy signature scheme from factorization
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
- On the Theory and Practice of Personal Digital Signatures
- Provably secure certificate-based proxy blind signature scheme from pairings
This page was built for publication: Proxy Signatures Secure Against Proxy Key Exposure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5445451)