On the security of an identity based multi-proxy signature scheme

H Xiong, J Hu, Z Chen, F Li - Computers & Electrical Engineering, 2011 - Elsevier
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his
proxy agent. Then only the cooperation of all the signers in the proxy group can generate the …

A provably secure proxy signature scheme in certificateless cryptography

H Xiong, F Li, Z Qin - Informatica, 2010 - content.iospress.com
A proxy signature scheme enables an original signer to delegate its signing capability to a
proxy signer and then the proxy signer can sign a message on behalf of the original signer …

Proxy signature-based role delegation scheme: formal analysis and simulation

A Bannore, RY Patil, Y H. Patil… - International Journal of …, 2024 - Springer
In the security domain, wide variety of signature schemes are available for providing
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …

[PDF][PDF] Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications.

N Al Ebri, J Baek, A Shoufan, QH Vu… - J. Wirel. Mob. Networks …, 2013 - isyou.info
As modern cryptographic schemes rely their security on the secrecy of the private keys used
in them, exposing such keys results in a total loss of security. In fact, attackers have been …

A forward-secure certificate-based signature scheme

J Li, H Teng, X Huang, Y Zhang… - The Computer Journal, 2015 - ieeexplore.ieee.org
Cryptographic computations are often carried out on insecure devices for which the threat of
key exposure raises a serious concern. In an effort to address the key exposure problem, the …

[PDF][PDF] A Certificateless Proxy Ring Signature Scheme with Provable Security.

H Xiong, Z Qin, F Li - Int. J. Netw. Secur., 2011 - academia.edu
Proxy ring signature allows proxy signer to sign messages on behalf of the original signer
while providing anonymity. Certificateless public key cryptography was first introduced by Al …

Provably secure forward secure certificateless proxy signature scheme

J Li, Y Li, Y Zhang - KSII Transactions on Internet and Information …, 2013 - koreascience.kr
In order to deal with key exposure problem, we introduce forward secure technique into
certificateless proxy signature scheme, and propose the formal definition and security model …

Compartment-based and hierarchical threshold delegated verifiable accountable subgroup multi-signatures

AR Ağırtaş, O Yayla - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we study the compartment-based and hierarchical delegation of signing power
of the verifiable accountable subgroup multi-signature (vASM). ASM is a multi-signature in …

Forward secure certificateless proxy multi-signature scheme

R Gao, J Zeng - … Journal of Electronic Security and Digital …, 2021 - inderscienceonline.com
In order to deal with key exposure problem, we introduce forward secure technique into
certificateless proxy multi-signature scheme, and give the formal definition and security …

A traceable certificateless threshold proxy signature scheme from bilinear pairings

T Yang, H Xiong, J Hu, Y Wang, Y Deng, B Xiao… - Web Technologies and …, 2011 - Springer
Using our (t, n) threshold proxy signature scheme, the original signer can delegate the
power of signing messages to a designated proxy group of n members. Any t or more proxy …