Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
Secure proxy signature schemes for delegation of signing rights
A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …
schemes have been suggested for use in numerous applications, particularly in distributed …
A comprehensive review on secure data sharing in cloud environment
Cloud computing is a constantly evolving archetype since web 2.0. Though it'sa popular IT
buzzword and concepts are derived from decade old grid computing, distributed computing …
buzzword and concepts are derived from decade old grid computing, distributed computing …
On proxy (multi-) signature schemes
HM Sun - 2000 - dspace.fcu.edu.tw
A proxy signature scheme allows a designed person, called a proxy signer, to sign
messages on behalf of an original signer. Generalizing the concept of the proxy signature …
messages on behalf of an original signer. Generalizing the concept of the proxy signature …
Security analysis of some proxy signatures
A proxy signature scheme allows an entity to delegate his/her signing capability to another
entity in such a way that the latter can sign messages on behalf of the former. Such schemes …
entity in such a way that the latter can sign messages on behalf of the former. Such schemes …
Proxy signature schemes based on factoring
Z Shao - Information Processing Letters, 2003 - Elsevier
The proxy signature schemes allow proxy signers to sign messages on behalf of an original
signer, a company or an organization. However, most of existing proxy signature schemes …
signer, a company or an organization. However, most of existing proxy signature schemes …
Designated-receiver proxy signature scheme for electronic commerce
JZ Dai, XH Yang, JX Dong - SMC'03 Conference Proceedings …, 2003 - ieeexplore.ieee.org
Proxy signature is the solution to delegation of signing capabilities in electronic world. Proxy
signatures are signature schemes that an original signer delegates his signing capability to …
signatures are signature schemes that an original signer delegates his signing capability to …
Personal health records integrity verification using attribute based proxy signature in cloud computing
Personal health records (PHRs) have been appeared as patient-centric model for health
information exchange, which are often outsourced to be stored in cloud services. However …
information exchange, which are often outsourced to be stored in cloud services. However …
A novel efficient (t, n) threshold proxy signature scheme
HF Huang, CC Chang - Information sciences, 2006 - Elsevier
All previously proposed threshold proxy signature schemes have been based on discrete
logarithms required for a protocol to generate and verify a shared secret among the proxy …
logarithms required for a protocol to generate and verify a shared secret among the proxy …
Injection of faults at component interfaces and inside the component code: are they equivalent?
The injection of interface faults through API parameter corruption is a technique commonly
used in experimental dependability evaluation. Although the interface faults injected by this …
used in experimental dependability evaluation. Although the interface faults injected by this …