Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

Secure proxy signature schemes for delegation of signing rights

A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …

A comprehensive review on secure data sharing in cloud environment

SK Kotha, MS Rani, B Subedi, A Chunduru… - Wireless Personal …, 2022 - Springer
Cloud computing is a constantly evolving archetype since web 2.0. Though it'sa popular IT
buzzword and concepts are derived from decade old grid computing, distributed computing …

On proxy (multi-) signature schemes

HM Sun - 2000 - dspace.fcu.edu.tw
A proxy signature scheme allows a designed person, called a proxy signer, to sign
messages on behalf of an original signer. Generalizing the concept of the proxy signature …

Security analysis of some proxy signatures

G Wang, F Bao, J Zhou, RH Deng - … , Seoul, Korea, November 27-28, 2003 …, 2004 - Springer
A proxy signature scheme allows an entity to delegate his/her signing capability to another
entity in such a way that the latter can sign messages on behalf of the former. Such schemes …

Proxy signature schemes based on factoring

Z Shao - Information Processing Letters, 2003 - Elsevier
The proxy signature schemes allow proxy signers to sign messages on behalf of an original
signer, a company or an organization. However, most of existing proxy signature schemes …

Designated-receiver proxy signature scheme for electronic commerce

JZ Dai, XH Yang, JX Dong - SMC'03 Conference Proceedings …, 2003 - ieeexplore.ieee.org
Proxy signature is the solution to delegation of signing capabilities in electronic world. Proxy
signatures are signature schemes that an original signer delegates his signing capability to …

Personal health records integrity verification using attribute based proxy signature in cloud computing

X Liu, J Ma, J Xiong, T Zhang, Q Li - … , October 28-30, 2013, Proceedings 6, 2013 - Springer
Personal health records (PHRs) have been appeared as patient-centric model for health
information exchange, which are often outsourced to be stored in cloud services. However …

A novel efficient (t, n) threshold proxy signature scheme

HF Huang, CC Chang - Information sciences, 2006 - Elsevier
All previously proposed threshold proxy signature schemes have been based on discrete
logarithms required for a protocol to generate and verify a shared secret among the proxy …

Injection of faults at component interfaces and inside the component code: are they equivalent?

R Moraes, R Barbosa, J Durães… - 2006 Sixth European …, 2006 - ieeexplore.ieee.org
The injection of interface faults through API parameter corruption is a technique commonly
used in experimental dependability evaluation. Although the interface faults injected by this …