Designated verifier proxy signature scheme without random oracles
From MaRDI portal
Publication:971640
DOI10.1016/J.CAMWA.2009.01.032zbMATH Open1186.94480OpenAlexW2026258103MaRDI QIDQ971640FDOQ971640
Authors: Yong Yu, Chunxiang Xu, XiaoSong Zhang, Yongjian Liao
Publication date: 16 May 2010
Published in: Computers & Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2009.01.032
Recommendations
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- Secure proxy signature schemes for delegation of signing rights
- Designated Verifier Proofs and Their Applications
- Information Security and Cryptology - ICISC 2003
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A novel ID-based designated verifier signature scheme
- Designated verifier proxy signature scheme with message recovery
- Title not available (Why is that?)
Cited In (7)
- Proxy Re-signature Schemes Without Random Oracles
- Short designated verifier proxy signatures
- Designated-verifier proxy blind signature scheme
- Attacks on one designated verifier proxy signature scheme
- Automata, Languages and Programming
- A model of bilinear-pairings based designated-verifier proxy signatue scheme
- Provably secure proxy signature scheme from factorization
This page was built for publication: Designated verifier proxy signature scheme without random oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q971640)