Proxy signature scheme
Webb14 dec. 2010 · Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can't resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum attack. The key pair of proxy signer … Webb1 mars 2016 · In a proxy signature scheme, the proxy signature is universally verifiable, whereas in a W(S)DVPS scheme, only the designated verifier can verify the signature. Furthermore, in proxy signature schemes, a proxy signature can only be created by the proxy signer, but this property does not hold in SDVPS.
Proxy signature scheme
Did you know?
WebbProxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. WebbProxy signature: A proxy signature allows a delegator to give partial signing rights to other parties called proxy signers. Proxy signatures do not offer Anonymity; Identity Escrow Schemes: Interactive dual of group signatures. Instead of off-line generation, a signature is directly generated by a signer based on a challenge provided by the ...
Webb1 maj 2024 · Comparing with the known identity-based proxy signcryption, the proposed scheme needs smaller computation complexity, smaller secret key size and smaller … Webbdesignated-verifier proxy signature scheme is the highly urgent request of a telemedicine system. Mambo et al. [7] presented the proxy signature (PS); this method implements authorization of signing power. According to the idea, the proxy signer is licensed for sign-ing an efficient proxy signature, and the verifier trusts this authorization ...
Webb1 maj 2024 · digital signature schemes have been presented in recent years. Regrettably, most existing schemes either have security vulnerabilities or poor performance. Very … WebbIn 1999, Sun proposed a nonrepudiable (t,n) threshold proxy signature scheme with known signers. Latter, Hwang et al. pointed out Sun's scheme is vulnerable to the so-called collusion attack that (n-1) malicious proxy signers in the proxy group could ...
WebbProxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been …
WebbMambo et al. [2] introduced the concept of proxy signature in 1996. In a proxy signa-ture scheme, an original signer can delegate its signing capability to a proxy signer to sign messages on its behalf. Proxy signature schemes have many practical applications such as mobile agent applications [3, 4], grid computing [5] and so on. Hwang and Chen [6] the launceston medical centreWebb1 aug. 2009 · Y. Xiaolin et al. [8] enhance the security of proxy signatures; based on the analysis of existing proxy signature schemes, a proxy signature scheme based on HEC is proposed, and the scheme's ... the launceston hotelWebb25 sep. 2014 · A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. the launceston hubWebbSince proxy signature scheme is widely used as a communication solution in distributed sensor networks, that is, the solution in healthcare wireless sensor networks in Verma et al. 29 In this article, we focus on developing multivariate signature schemes with special properties and investigate how to build an MPKC proxy scheme and then we will use this … thyroid tea recipe coconut and turmericWebb1 apr. 2012 · A certificateless public-key proxy signature scheme essentially consists of three parts, a certificateless public-key signature for generation of a delegation … thyroid temperature regulationWebbUsing the blind version of a modification of DSA signature scheme together with cut-and-choose technique, an anonymous fingerprinting protocol is proposed, which can offer anonymity for the buyer in a stronger sense by resisting the collusion between the merchant and the registration center. thyroid temperature test digitalWebb7 maj 2024 · Multi-proxy signature schemes (MPSS) allow nproxy signers to generate a valid signature on behalf of the original signer. A new efficient self-certified MPSS with message recovery based on the Elliptic Curve Discrete Logarithm Problem (i.e., ECDLP) is proposed in this paper. the launceston medical hub