Sign Up to like & get
recommendations!
0
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-1074-2
Abstract: In proxy re-signature scheme, the semi-trust proxy is given special information to convert user A’s signature into another user B’s signature on the same message m. This has numerous application, such as simplifying the certificate…
read more here.
Keywords:
signature scheme;
universally composable;
security;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Modern Physics Letters A"
DOI: 10.1142/s0217732320501977
Abstract: A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally…
read more here.
Keywords:
security model;
quantum proxy;
quantum;
proxy signature ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/1550147720914775
Abstract: Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment…
read more here.
Keywords:
multivariate public;
key cryptographic;
scheme;
proxy signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Applied Sciences"
DOI: 10.3390/app10175770
Abstract: The quantum proxy signature is one of the most significant formalisms in quantum signatures. We put forward a quantum proxy signature scheme using quantum walk-based teleportation and quantum one-time pad CNOT (QOTP-CNOT) operation, which includes…
read more here.
Keywords:
quantum proxy;
time;
scheme;
proxy signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Entropy"
DOI: 10.3390/e25030454
Abstract: Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications. However, existing post quantum proxy signature schemes with larger signature sizes might…
read more here.
Keywords:
signature;
based proxy;
identity based;
message recovery ... See more keywords