Proxy Signatures Secure Against Proxy Key Exposure
From MaRDI portal
Publication:5445451
DOI10.1007/978-3-540-78440-1_9zbMATH Open1162.94400OpenAlexW1587376951MaRDI QIDQ5445451FDOQ5445451
Authors: Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson
Publication date: 5 March 2008
Published in: Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78440-1_9
Recommendations
- Secure proxy signature schemes for delegation of signing rights
- Secure Proxy Multi-signature Scheme in the Standard Model
- Information Security and Cryptology - ICISC 2003
- A New Proxy Signature Scheme Providing Self-delegation
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
Cites Work
- Short signatures from the Weil pairing
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security and Cryptology - ICISC 2003
- Efficient one-time proxy signatures
- Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Secure proxy signature schemes for delegation of signing rights
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Strong Key-Insulated Signature Schemes
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
- An Efficient ID-Based Proxy Signature Scheme from Pairings
Cited In (14)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- An improved efficient identity-based proxy signature in the standard model
- Secure proxy signature schemes for delegation of signing rights
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem
- A New Proxy Signature Scheme Providing Self-delegation
- Delegation of signing rights using certificateless proxy signatures
- Proxy-protected signature secure against the undelegated proxy signature attack
- Security weakness of a certificate-based proxy signature scheme for IIoT environments
- Provably secure proxy signature scheme from factorization
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
- On the Theory and Practice of Personal Digital Signatures
- Provably secure certificate-based proxy blind signature scheme from pairings
This page was built for publication: Proxy Signatures Secure Against Proxy Key Exposure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5445451)