Attacks on One Designated Verifier Proxy Signature Scheme
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the o...
Saved in:
Main Author: | Baoyuan Kang |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2012-01-01
|
Series: | Journal of Applied Mathematics |
Online Access: | http://dx.doi.org/10.1155/2012/508981 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
by: Jiahui Chen, et al.
Published: (2020-04-01) -
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
Verifying the resonance schemes of unstable particles at lepton colliders
by: Shao-Feng Ge, et al.
Published: (2025-02-01) -
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
by: Chen Zhang, et al.
Published: (2025-01-01) -
Time-and-ID-Based Proxy Reencryption Scheme
by: Kambombo Mtonga, et al.
Published: (2014-01-01)