Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714137
DOI10.1007/b96249zbMath1092.94518OpenAlexW2493429532MaRDI QIDQ5714137
Jianying Zhou, Guilin Wang, Feng Bao, Robert H. Deng
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96249
Related Items (10)
Provably secure proxy signature scheme from factorization ⋮ Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature ⋮ Delegating signing rights in a multivariate proxy signature scheme ⋮ Secure proxy signature schemes for delegation of signing rights ⋮ Directed proxy signature in the standard model ⋮ Designated verifier proxy signature scheme without random oracles ⋮ Proxy Signatures Secure Against Proxy Key Exposure ⋮ Universal forgery on a group signature scheme using self-certified public keys ⋮ Unnamed Item ⋮ Secure Proxy Multi-signature Scheme in the Standard Model
This page was built for publication: Information Security and Cryptology - ICISC 2003