Articles with "proxy signature" as a keyword



Photo by scottwebb from unsplash

Universally composable secure proxy re-signature scheme with effective calculation

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1074-2

Abstract: In proxy re-signature scheme, the semi-trust proxy is given special information to convert user A’s signature into another user B’s signature on the same message m. This has numerous application, such as simplifying the certificate… read more here.

Keywords: signature scheme; universally composable; security; scheme ... See more keywords
Photo from wikipedia

Quantum proxy signature with provable security

Sign Up to like & get
recommendations!
Published in 2020 at "Modern Physics Letters A"

DOI: 10.1142/s0217732320501977

Abstract: A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally… read more here.

Keywords: security model; quantum proxy; quantum; proxy signature ... See more keywords
Photo by hudsoncrafted from unsplash

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/1550147720914775

Abstract: Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment… read more here.

Keywords: multivariate public; key cryptographic; scheme; proxy signature ... See more keywords
Photo by jontyson from unsplash

Quantum Proxy Signature Scheme with Discrete Time Quantum Walks and Quantum One-Time Pad CNOT Operation

Sign Up to like & get
recommendations!
Published in 2020 at "Applied Sciences"

DOI: 10.3390/app10175770

Abstract: The quantum proxy signature is one of the most significant formalisms in quantum signatures. We put forward a quantum proxy signature scheme using quantum walk-based teleportation and quantum one-time pad CNOT (QOTP-CNOT) operation, which includes… read more here.

Keywords: quantum proxy; time; scheme; proxy signature ... See more keywords
Photo by kellysikkema from unsplash

Identity-Based Proxy Signature with Message Recovery over NTRU Lattice

Sign Up to like & get
recommendations!
Published in 2023 at "Entropy"

DOI: 10.3390/e25030454

Abstract: Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications. However, existing post quantum proxy signature schemes with larger signature sizes might… read more here.

Keywords: signature; based proxy; identity based; message recovery ... See more keywords