On the security of an identity based multi-proxy signature scheme
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his
proxy agent. Then only the cooperation of all the signers in the proxy group can generate the …
proxy agent. Then only the cooperation of all the signers in the proxy group can generate the …
A provably secure proxy signature scheme in certificateless cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a
proxy signer and then the proxy signer can sign a message on behalf of the original signer …
proxy signer and then the proxy signer can sign a message on behalf of the original signer …
Proxy signature-based role delegation scheme: formal analysis and simulation
In the security domain, wide variety of signature schemes are available for providing
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …
[PDF][PDF] Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications.
As modern cryptographic schemes rely their security on the secrecy of the private keys used
in them, exposing such keys results in a total loss of security. In fact, attackers have been …
in them, exposing such keys results in a total loss of security. In fact, attackers have been …
A forward-secure certificate-based signature scheme
J Li, H Teng, X Huang, Y Zhang… - The Computer Journal, 2015 - ieeexplore.ieee.org
Cryptographic computations are often carried out on insecure devices for which the threat of
key exposure raises a serious concern. In an effort to address the key exposure problem, the …
key exposure raises a serious concern. In an effort to address the key exposure problem, the …
[PDF][PDF] A Certificateless Proxy Ring Signature Scheme with Provable Security.
Proxy ring signature allows proxy signer to sign messages on behalf of the original signer
while providing anonymity. Certificateless public key cryptography was first introduced by Al …
while providing anonymity. Certificateless public key cryptography was first introduced by Al …
Provably secure forward secure certificateless proxy signature scheme
J Li, Y Li, Y Zhang - KSII Transactions on Internet and Information …, 2013 - koreascience.kr
In order to deal with key exposure problem, we introduce forward secure technique into
certificateless proxy signature scheme, and propose the formal definition and security model …
certificateless proxy signature scheme, and propose the formal definition and security model …
Compartment-based and hierarchical threshold delegated verifiable accountable subgroup multi-signatures
AR Ağırtaş, O Yayla - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we study the compartment-based and hierarchical delegation of signing power
of the verifiable accountable subgroup multi-signature (vASM). ASM is a multi-signature in …
of the verifiable accountable subgroup multi-signature (vASM). ASM is a multi-signature in …
Forward secure certificateless proxy multi-signature scheme
R Gao, J Zeng - … Journal of Electronic Security and Digital …, 2021 - inderscienceonline.com
In order to deal with key exposure problem, we introduce forward secure technique into
certificateless proxy multi-signature scheme, and give the formal definition and security …
certificateless proxy multi-signature scheme, and give the formal definition and security …
A traceable certificateless threshold proxy signature scheme from bilinear pairings
T Yang, H Xiong, J Hu, Y Wang, Y Deng, B Xiao… - Web Technologies and …, 2011 - Springer
Using our (t, n) threshold proxy signature scheme, the original signer can delegate the
power of signing messages to a designated proxy group of n members. Any t or more proxy …
power of signing messages to a designated proxy group of n members. Any t or more proxy …