site stats

Proxy signature scheme

WebbProxy signatures, which allow the original signer to authorize the proxy signer to sign messages on his behalf, plays a key role in cryptography. Since Mambo et al. [52] proposed the concept of the proxy signature in 1996, some signature schemes have been proposed. Wang et al. [53] proposed a one-time proxy signature scheme without decoher-ence. Webbproxy signature scheme that is provably secure in the random-oracle model, under the discrete-logarithm assumption. Keywords: Digital signatures, proxy signatures, …

Lattice-Based Proxy Signature IEEE Conference Publication IEEE …

Webb11 apr. 2024 · A quantum proxy signature scheme by using random sequence to blind the message is proposed. Our scheme introduces the trusted party Trent and enhances the eavesdropping check to ensure higher security. It only uses the Von Neumann measurement, which reduces measurement times and improves efficiency. Webb17 dec. 2024 · Proxy signature scheme has been widely used in numerous applications. This paper proposed a proxy signature scheme based on lattice cryptography which is … the launch agency https://rubenesquevogue.com

Short and provably secure designated verifier proxy signature scheme …

WebbTo improve the security of industrial Internet of things (IIoT), several concrete constructions of certificate-based proxy signature (CBPS) scheme without bilin Secure … Webb16 okt. 2010 · A proxy signature scheme permits an entity to delegate its signing rights to another. These schemes have been suggested for use in numerous applications, p … the launceston store western junction

Two Quantum Proxy Blind Signature Schemes Based on …

Category:Secure Proxy Signature Schemes for Delegation of Signing Rights

Tags:Proxy signature scheme

Proxy signature scheme

A Survey on Proxy Re-Signature Schemes for Translating One Type …

Webb14 dec. 2010 · Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can't resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum attack. The key pair of proxy signer … Webb1 mars 2016 · In a proxy signature scheme, the proxy signature is universally verifiable, whereas in a W(S)DVPS scheme, only the designated verifier can verify the signature. Furthermore, in proxy signature schemes, a proxy signature can only be created by the proxy signer, but this property does not hold in SDVPS.

Proxy signature scheme

Did you know?

WebbProxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. WebbProxy signature: A proxy signature allows a delegator to give partial signing rights to other parties called proxy signers. Proxy signatures do not offer Anonymity; Identity Escrow Schemes: Interactive dual of group signatures. Instead of off-line generation, a signature is directly generated by a signer based on a challenge provided by the ...

Webb1 maj 2024 · Comparing with the known identity-based proxy signcryption, the proposed scheme needs smaller computation complexity, smaller secret key size and smaller … Webbdesignated-verifier proxy signature scheme is the highly urgent request of a telemedicine system. Mambo et al. [7] presented the proxy signature (PS); this method implements authorization of signing power. According to the idea, the proxy signer is licensed for sign-ing an efficient proxy signature, and the verifier trusts this authorization ...

Webb1 maj 2024 · digital signature schemes have been presented in recent years. Regrettably, most existing schemes either have security vulnerabilities or poor performance. Very … WebbIn 1999, Sun proposed a nonrepudiable (t,n) threshold proxy signature scheme with known signers. Latter, Hwang et al. pointed out Sun's scheme is vulnerable to the so-called collusion attack that (n-1) malicious proxy signers in the proxy group could ...

WebbProxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been …

WebbMambo et al. [2] introduced the concept of proxy signature in 1996. In a proxy signa-ture scheme, an original signer can delegate its signing capability to a proxy signer to sign messages on its behalf. Proxy signature schemes have many practical applications such as mobile agent applications [3, 4], grid computing [5] and so on. Hwang and Chen [6] the launceston medical centreWebb1 aug. 2009 · Y. Xiaolin et al. [8] enhance the security of proxy signatures; based on the analysis of existing proxy signature schemes, a proxy signature scheme based on HEC is proposed, and the scheme's ... the launceston hotelWebb25 sep. 2014 · A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. the launceston hubWebbSince proxy signature scheme is widely used as a communication solution in distributed sensor networks, that is, the solution in healthcare wireless sensor networks in Verma et al. 29 In this article, we focus on developing multivariate signature schemes with special properties and investigate how to build an MPKC proxy scheme and then we will use this … thyroid tea recipe coconut and turmericWebb1 apr. 2012 · A certificateless public-key proxy signature scheme essentially consists of three parts, a certificateless public-key signature for generation of a delegation … thyroid temperature regulationWebbUsing the blind version of a modification of DSA signature scheme together with cut-and-choose technique, an anonymous fingerprinting protocol is proposed, which can offer anonymity for the buyer in a stronger sense by resisting the collusion between the merchant and the registration center. thyroid temperature test digitalWebb7 maj 2024 · Multi-proxy signature schemes (MPSS) allow nproxy signers to generate a valid signature on behalf of the original signer. A new efficient self-certified MPSS with message recovery based on the Elliptic Curve Discrete Logarithm Problem (i.e., ECDLP) is proposed in this paper. the launceston medical hub