Proxy Re-signature Schemes Without Random Oracles
From MaRDI portal
Publication:5458210
DOI10.1007/978-3-540-77026-8_15zbMATH Open1153.94460OpenAlexW1776947587MaRDI QIDQ5458210FDOQ5458210
Authors: Jun Shao, Zhenfu Cao, Licheng Wang, Xiao-Hui Liang
Publication date: 11 April 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77026-8_15
Recommendations
- Proxy Re-signatures in the Standard Model
- Proxy re-signature scheme that translates one type of signature scheme to another type of signature scheme
- Designated verifier proxy signature scheme without random oracles
- Secure Proxy Multi-signature Scheme in the Standard Model
- Threshold proxy re-signature
Cites Work
- Identity-based cryptosystems and signature schemes
- Secure Hash-and-Sign Signatures Without the Random Oracle
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- A new signature scheme without random oracles from bilinear pairings
- Advances in Cryptology – CRYPTO 2004
- Proxy Re-signature Schemes Without Random Oracles
- Efficient Identity-Based Signatures Secure in the Standard Model
- On the Generic Construction of Identity-Based Signatures with Additional Properties
- Information Security and Cryptology - ICISC 2005
Cited In (9)
- Identity-based key-insulated proxy signature without random oracles
- Title not available (Why is that?)
- Proxy Re-signature Schemes Without Random Oracles
- A strong designated verifier proxy re-signature scheme for IoT environments
- Proxy re-signature scheme that translates one type of signature scheme to another type of signature scheme
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
- Identity-based proxy re-signatures from lattices
- Threshold proxy re-signature
- Proxy Re-signatures in the Standard Model
This page was built for publication: Proxy Re-signature Schemes Without Random Oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458210)