ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Security analysis and improvement of some proxy signature schemes
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046297
◽
2004
◽
Author(s):
Li Jiguo
◽
Zhang Yichen
◽
Zhu Yuelong
Keyword(s):
Security Analysis
◽
Proxy Signature
◽
Signature Schemes
Download Full-text
Related Documents
Cited By
References
The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes
International Journal of Theoretical Physics
◽
10.1007/s10773-017-3342-6
◽
2017
◽
Vol 56
(6)
◽
pp. 1983-1994
◽
Cited By ~ 7
Author(s):
Long Zhang
◽
Hai-Yan Zhang
◽
Ke-Jia Zhang
◽
Qing-Le Wang
Keyword(s):
Security Analysis
◽
Proxy Signature
◽
Signature Schemes
◽
Quantum Proxy Signature
Download Full-text
Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
◽
10.1109/trustcom.2013.83
◽
2013
◽
Author(s):
Minghui Zheng
◽
Yongquan Cui
◽
Liang Chen
Keyword(s):
Security Analysis
◽
Proxy Signature
◽
Signature Scheme
◽
Threshold Proxy Signature
Download Full-text
Secure Proxy Signature Schemes for Delegation of Signing Rights
Journal of Cryptology
◽
10.1007/s00145-010-9082-x
◽
2010
◽
Vol 25
(1)
◽
pp. 57-115
◽
Cited By ~ 101
Author(s):
Alexandra Boldyreva
◽
Adriana Palacio
◽
Bogdan Warinschi
Keyword(s):
Proxy Signature
◽
Signature Schemes
Download Full-text
Some New Proxy Signature Schemes from Pairings
The International Series in Engineering and Computer Science - Progress on Cryptography
◽
10.1007/1-4020-7987-7_8
◽
2006
◽
pp. 59-66
◽
Cited By ~ 9
Author(s):
Fangguo Zhang
◽
Reihaneh Safavi-Naini
◽
Chin-Yin Lin
Keyword(s):
Proxy Signature
◽
Signature Schemes
Download Full-text
Factoring-Based Proxy Signature Schemes with Forward-Security
Computational and Information Science - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30497-5_159
◽
2004
◽
pp. 1034-1040
◽
Cited By ~ 2
Author(s):
Zhenchuan Chai
◽
Zhenfu Cao
Keyword(s):
Proxy Signature
◽
Forward Security
◽
Signature Schemes
Download Full-text
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Information Security Applications - Lecture Notes in Computer Science
◽
10.1007/11604938_2
◽
2006
◽
pp. 10-24
◽
Cited By ~ 3
Author(s):
Je Hong Park
◽
Bo Gyeong Kang
◽
Sangwoo Park
Keyword(s):
Proxy Signature
◽
Signature Schemes
Download Full-text
Identity-based threshold signature and mediated proxy signature schemes
The Journal of China Universities of Posts and Telecommunications
◽
10.1016/s1005-8885(07)60128-9
◽
2007
◽
Vol 14
(2)
◽
pp. 69-74
◽
Cited By ~ 2
Author(s):
Yong YU
◽
Bo YANG
◽
Ying SUN
Keyword(s):
Proxy Signature
◽
Threshold Signature
◽
Signature Schemes
◽
Identity Based
Download Full-text
Security Analysis of Improved Cubic UOV Signature Schemes
Information Security and Cryptology – ICISC 2017 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-78556-1_17
◽
2018
◽
pp. 310-324
Author(s):
Kyung-Ah Shim
◽
Namhun Koo
◽
Cheol-Min Park
Keyword(s):
Security Analysis
◽
Signature Schemes
Download Full-text
Study on Proxy Signature Schemes with Bionic Optimization
2009 Second International Conference on Future Information Technology and Management Engineering
◽
10.1109/fitme.2009.97
◽
2009
◽
Author(s):
Xuanwu Zhou
◽
Ping Wei
◽
Xiaoyuan Yang
◽
Ping Zhang
Keyword(s):
Proxy Signature
◽
Signature Schemes
Download Full-text
Security Analysis and Improvement of a (t, n) Threshold Proxy Signature Scheme
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
◽
10.1109/snpd.2007.301
◽
2007
◽
Author(s):
Fanyu Kong
◽
Jia Yu
◽
Baodong Qin
◽
Ming Li
◽
Daxing Li
Keyword(s):
Security Analysis
◽
Proxy Signature
◽
Signature Scheme
◽
Threshold Proxy Signature
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close