Sciweavers

64 search results - page 2 / 13
» Proxy Cryptography Revisited
Sort
View
TCC
2007
Springer
76views Cryptology» more  TCC 2007»
14 years 1 months ago
Designated Confirmer Signatures Revisited
Douglas Wikström
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 7 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
ISPEC
2005
Springer
14 years 1 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
14 years 2 months ago
Revisiting the IDEA Philosophy
Pascal Junod, Marco Macchetti
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
14 years 1 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo